<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>volume 1(2-97) of Eastern-European Journal of
Enterprise Technologies</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Application of Online Marketing Methods and SEO Technologies for Web Resources Analysis within the Region</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Volodymyr Kuchkovskiy</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vasyl Andrunyk</string-name>
          <email>vasyl.a.andrunyk@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maksym Krylyshyn</string-name>
          <email>maksym.krylyshyn.mnsa.2020@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lyubomyr Chyrun</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anatolii Vysotskyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sofia Chyrun</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Sokulska</string-name>
          <email>natalya.sokulska@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ilona Brodovska</string-name>
          <email>Ilonabrodovska@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>S. Bandera Street, 12, Lviv, 79013</addr-line>
          ,
          <institution>Ukraine Ivan Franko National University of Lviv</institution>
          ,
          <addr-line>University Street, 1, Lviv, 79000</addr-line>
          ,
          <institution>Ukraine Anat Company</institution>
          ,
          <addr-line>Chervona Kalyna Avenue, 104, Lviv, 79049</addr-line>
          ,
          <institution>Ukraine Hetman Petro Sahaidachnyi National Army Academy</institution>
          ,
          <addr-line>Heroes of Maidan Street, 32, Lviv, 79012</addr-line>
          ,
          <institution>Ukraine Limited Liability Company Financial Company Absolute Finance</institution>
          ,
          <addr-line>E. Konovaltsya Street, Kyiv, 01133</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>2604</volume>
      <fpage>662</fpage>
      <lpage>669</lpage>
      <abstract>
        <p>This article presents the content analysis methods for information Web resources within a particular region. The model describes content analysis for processing Web resources in online marketing and simplifies the content automation management technology. The main problems of semantic and syntactic content analysis and functional services for textual content management are analysed. The rapid growth of Internet and e-business facilitates the publication and moderation of articles, which offers an intelligent system of marketing decisions to distribute content from a specific region to a particular target audience. The article describes developing information technology for processing Web resources of e-commerce based on online marketing and SEO methods. A new approach to the e-business processes application and implementation to such intelligent systems building is formulated. Processing content and information resource methods based on SEO technology and online marketing are described. Software for content and information resource processing is developed.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Content</kwd>
        <kwd>business process</kwd>
        <kwd>management system</kwd>
        <kwd>SEO-technology</kwd>
        <kwd>Google analytics</kwd>
        <kwd>targeting</kwd>
        <kwd>information resource</kwd>
        <kwd>content management</kwd>
        <kwd>typical regional information resource</kwd>
        <kwd>search engine</kwd>
        <kwd>internet marketing</kwd>
        <kwd>search engine marketing</kwd>
        <kwd>content analysis</kwd>
        <kwd>content management system</kwd>
        <kwd>conversion path</kwd>
        <kwd>conversion rate</kwd>
        <kwd>attribution model</kwd>
        <kwd>content management interoperability service</kwd>
        <kwd>direct marketing</kwd>
        <kwd>target audience</kwd>
        <kwd>web content management</kwd>
        <kwd>web site</kwd>
        <kwd>commerce content system</kwd>
        <kwd>processing information resource</kwd>
        <kwd>e-commerce content</kwd>
        <kwd>post-click analysis</kwd>
        <kwd>formal content management model</kwd>
        <kwd>content creation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Available content management technology is online marketing with Public relations, information
management, Internet integration, customer service and sales in various fields [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ]. Online marketing
utilizes all essentials and aspects of traditional marketing in conjunction with new research methods (e.g.,
viral marketing) and information analysis using modern IT [
        <xref ref-type="bibr" rid="ref5 ref6 ref7 ref8 ref9">5-9</xref>
        ]. These relatively constant contact with
users are effective thanks to the automatic tracking of statistics, which uses the Return on Investment
(ROI), Rate of Return (ROR) and visitor efficiency to analyse or convert in e-commerce. The primary
purpose of online marketing is to get the maximum effect from the potential audience of the site with the
ability to demand, sales, and visits statistics, etc. [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">10-12</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
      <p>
        Online marketing involves using strategies and areas of traditional marketing and the particular regions
of research that apply to the Internet space e-business (Fig. 1, Table 1). Online marketing is not only
content trading but also e-business models, software, content spaces, etc. [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ]. Google, Yahoo, and MSN
have taken it to the next level and segmented the online advertising market by offering e-commerce
inhouse advertising services. Due to the automation of the audience research process, the return on
investment is increasing, and costs are decreasing. The online marketing advantages: the possibility of
the most accurate targeting (Table 2-4), interactivity, the opportunity of post-click analysis to maximize
website conversion rates and ROR/ROI of online advertising [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ].
c)
Figure 1: a) Viral marketing; b) basic directions of Internet marketing; c) areas of Internet marketing
      </p>
      <p>Online auctions have gained popularity. Unique things found in flea markets are now
on sale at online auctions such as eBay and more. Auction development has</p>
      <p>dramatically influenced the prices of unique and antique items.</p>
      <p>The impact on the advertising industry has been and still is enormous. Over the years,
online advertising has grown steadily, reaching tens of billions of dollars a year.</p>
      <p>Advertisers have begun to change their priorities actively, and today online</p>
      <p>advertising already occupies a significant market niche.</p>
      <p>It increases the volume and geography of portable electronic devices (mobile phones,
players, etc.) using modern marketing methods to promote the product to the</p>
      <p>Internet market.</p>
      <p>Increase the volume, shorten the cycle of production/sale of intangible goods, and
provide relevant services.</p>
      <p>Online shopping sites have long ceased to be bulletin boards, some of which have
become large corporations that provide a range of marketing services. Prices for
participation in such venues (privileged membership) are also increasing, despite their
increasing number.</p>
      <p>
        Site conversion is the ratio of the number of visitors to the site. It is who completed the targeted actions
(hidden / direct instructions from advertisers, sellers, content formation, visits a particular page of a site,
passing through an advertising link), to the total number of visitors site [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7 ref8 ref9">1-9</xref>
        ].
      </p>
      <p>Definition
An object sold via the Internet through a Web site; has its price and decent quality,
is in demand, competes with similar things of other Web sites and traditional stores.
Controlled quantitative indicator of the cost of goods with the following properties:
much lower than in a regular store due to cost savings; regularly compared to prices
for similar competing products.</p>
      <p>A set of methods of promoting the site on the Internet and goods, which includes a
vast arsenal of tools (search promotion, contextual advertising, banner advertising,
e-mail marketing, affiliate (affiliate, English. Affiliate) marketing, viral marketing,</p>
      <p>hidden marketing, interactive advertising, work with blogs and more
Point of sale (Web site), where graphic design and usability play a significant role,
the usability of the site, quality of processing applications from the site, speed of
loading, work with payment systems, terms of delivery, work with customers</p>
      <p>before, during and after the sale.</p>
      <p>Processes aimed at creating/increasing demand and achieving e-business goals</p>
      <p>through Internet technologies to maximize customer/product needs.</p>
      <p>Characteristic
An effective way to promote (increase visits) and a powerful tool to improve the
image of website owners. Static/animated image ads (often Web-banner size 468</p>
      <p>× 60 pixels), linked via a hyperlink from the advertiser or a page with more
information. Together with content advertising is one of the significant formats
of advertising on the Internet. Classic Web Banner - A GIF, SWF or JPG image file
with static/animated image. Web banners are also created using Flash or Java
technologies. Unlike traditional (bitmap) graphics, they use vector graphics to
implement animation and sound effects at a small size, increasing the banner's</p>
      <p>effectiveness as an advertising medium.</p>
      <p>An effective way to increase sales and marketing results by focusing on website
visitors who are responsive to Internet marketing activities (pay per click</p>
      <p>advertising, HTML email, search to increase conversions)
The advertising mechanism (Table 4) isolates from the entire existing audience
only the part that meets the set criteria (for example, the target audience) and</p>
      <p>shows the advertisement to it.</p>
      <p>The advertising principle focuses on the website content, either manually or
automatically as a banner or text ad. The most robust contextual advertising
Geo-Targeting, to choose geographic display pages. Show time frame limits are</p>
      <p>also applied.</p>
      <p>A set of measures is aimed at increasing search engine traffic. Previously, the
search result meant only links to relevant pages (usually on the left side of the</p>
      <p>page). Now they include advertisements on the right side of the page. Most
search engine technologies do not allow you to achieve your advertising goals:</p>
      <p>they do not always directly report the advertised product or service; do not
continuously pursue the purpose of sale; with their help, it is challenging to raise</p>
      <p>brand awareness; it is not possible to bring a new product to the market. The
results of using any search engine technology can be two: attracting users to the
site, and for each case, the characteristics of that audience are different;
disseminating information about your site or business to search engines.</p>
      <p>Optimization for social media, a set of purely technical measures aimed at
transforming the site content so that it can be used as simply as possible in</p>
      <p>online communities (forums, blogs)
Promoting or promoting anything in social media (blogs, forums, online</p>
      <p>communities)
A type of marketing communication is based on direct personal communication
with the recipient (B2C consumer or B2B client) to build relationships and profit.</p>
      <p>Direct marketing is based on the attitude towards the client as an individual,
provides feedback and does not use information brokers for communication. In
Western marketing, direct marketing is referred to as BTL events (below the line,
used instead of ATL - direct advertising), which combines promotions, Direct
email, exhibitions, POS and more. Direct marketing often uses direct mailing to
the target audience via email, e-mail, SMS and more. Direct marketing is focused
not on the target groups but individual individuals. Direct marketing activities
require creating a database of clients - structured, constantly updated fresh
information about individuals or legal entities and their consumer preferences
and needs to further process this information and formulate a product offering
that meets their needs. Databases in direct marketing are closely linked to the
CRM concept of customer or customer relationship management, allowing you
to consolidate all customer information and streamline all stages of customer</p>
      <p>relationships from marketing and sales to after-sales service.</p>
      <p>Guidelines are based on encouraging individuals to pass on a marketing message
to other individuals that create the potential for exponential growth in the
impact of the news. Like viruses, such techniques use every opportunity to</p>
      <p>increase the number of messages transmitted.</p>
      <p>A marketing concept is that seeks to find a firm/entrepreneur in their marketing</p>
      <p>niche, refusing to compete openly with their powerful competitors,
concentrating efforts on segregated areas of the front, and using non-traditional
Aiming
Precision
marketing
but effective ways to advertise and promote their products/services. Partisan
marketing is characterized by flexibility and mobility, sometimes called
low</p>
      <p>budget/low-cost.</p>
      <p>A method is for increasing Internet marketing success through the technology of
retaining existing customers, cross-selling and up-selling. Precision analysis and</p>
      <p>ROI / ROR e-business and conversion rate allow you to get sales statistics,
demand, and more instantly. Emphasizes the relevance of commercial content
that is achieved directly through the personal preferences of site visitors, the
collection and analysis of users' behavioural and transactional data.</p>
      <p>Definition
The most popular targeting type. It is done by selecting the advertising sites so</p>
      <p>that their visitors match the target audience.</p>
      <p>Show content ads on websites that are relevant to the content.</p>
      <p>Display advertising (contextual advertising) by the interests of visitors to the site.</p>
      <p>Shows ads to a target audience that is restricted to a specific geographic region</p>
      <p>selected by the advertiser.</p>
      <p>It allows you to limit your ad delivery by the time of day (morning/evening,</p>
      <p>weekdays/weekends), weeks, and years.</p>
      <p>Display ads that focus on a specific class of target audience: split ads by the</p>
      <p>target audience by age, gender, revenue, position, etc.</p>
      <p>It allows you to adjust the number of impressions of the advertising medium to
one unique user as he interacts with the advertising platform. Most commonly</p>
      <p>used in banner ads with pay per 1000 impressions.</p>
      <p>The most promising direction to date is to introduce a mechanism for collecting</p>
      <p>user actions on the Internet through cookies.</p>
      <p>AlterGeo first mentioned the concept. The bottom line is that knowing about the</p>
      <p>object's movement (the exact location up to the institution where the thing is
located can determine modern geo-social services. For example, AlterGeo.ru). It
stops at some points, and you can represent the habits and passions of the
object. For instance, if a thing goes to a beerhouse, the beer is probably</p>
      <p>interested.</p>
      <p>Also, one of the most promising areas is based on information on psychological
qualities (psycho-type, society), various advertising is published. Theoretical</p>
      <p>background - Socionics.</p>
      <p>The newest technology, the essence of which is: For each customer, based on the
specifics of communication of their managers with clients, a behavioural matrix is
created, which contains not only stereotypical models of thinking of customers in
this business model, but also weighting coefficients of their importance in
percentage. This detail allows you to evaluate the site's quality (structure,
usability, design, the text content), not at the level of good/bad, but the group of</p>
      <p>specific figures.</p>
      <p>
        Staying in touch with users is effective thanks to the automatic tracking of statistics, which uses
ROI/ROR rates and Web resources conversion to analyse. The modification or performance of Web
resource visit is the ratio of the number of information resource visitors who completed the targeted
activity to the total number of Web site visitors [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. It is hidden/direct instructions from sellers,
advertisers, and content creators, i.e. subscribe, purchase, sign up, visit of a particular Web resource page,
and navigate to an advertising link (Table 5) [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ].
      </p>
      <p>Definition
The principle of organizing a system where the goal is achieved by exchanging</p>
      <p>content between the environment and system elements
The increasing search engine traffic, generating search results lists and</p>
      <p>advertisements (Table 6)
An advertising mechanism allows you to allocate an information resource from
the entire audience to a target resource that meets the set criteria for its</p>
      <p>advertising
A post-click marketing method that maximizes the performance and conversion</p>
      <p>of your information resource and Internet ROI</p>
      <p>
        Usability user is total fertility convenience when using the object. The user interfaces development of
e is focused on the maximum visual/psychological comfort; coefficient of efficiency of execution of menu
design and system of navigation on the information resource; convenience and ease of use,
userfriendliness, and practicality of the user interface.
SEM technology (Fig. 3, a) has following characteristics [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ]:
 Context analysis (advertising site topics, etc.).
 Dealing with queries by specific keywords.
 Search Engagement (Website Search, Search Engines).
 Increase of the Findability content of the Web site content (Fig. 3b).
      </p>
      <p>b)
Figure 3: Technologies: a) search engine marketing and b) Findability</p>
      <p>
        Usability – user is a general convenience factor when using object; the user interfaces development
focused on the maximum visual/psychological convenience; menu design performance and site
navigation; convenience and ease of use, user-friendliness, and practicality of the software interface.
Search engine marketing does not reach advertising goals due to the following factors [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]: they do not
always directly report the advertised product; do not continuously pursue the purpose of selling the
product/service; with their help, it is challenging to increase brand recognition; it is impossible to market
a new service /product/content.
      </p>
      <p>
        Using SEM result is [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]:
1. Attracting users to an information resource where the audience differs on a case-by-case basis,
therefore attracting a broad (increasing attendance rate of the Web resource) or an interested
audience;
2. Content dissemination about Web resources in SEO.
      </p>
      <p>
        The criterion of a successful SEM strategy is the number of visitors to the Web resource and the quality
of the resulting audience. A simple measure for checking the popularity of Web resource is the dynamics
of the number of external links to the Web resource and the increase in references to the name of a
service/product/content or company trademark. The marginal case of SEO and contextual advertising is
the placement of advertisements in the content search results of the Web resource. The development of
the Internet has fostered new search engine marketing technologies for social networks (Video Marketing
Marketing). The separation of search engine marketing into a separate standalone strategy is associated
with [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]:
 The continued growth of the Internet market;
 The growth of the contextual / search advertising market;
 Using SEO technology [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ];
 The need for optimal surfing/navigation in content;
 Supporting the complex content lifecycle process it goes through while managing the various
stages of publishing.
      </p>
      <p>The process of designing and creating an electronic content commerce systems (ECCS) based on the
results of online marketing is iterative and proceeds from analysis, design, plan development to prototype
creation and experimental testing, starting with the specification, layout, template creation, content
formation, and content according to the structure of the information resource (Fig. 4).</p>
      <p>Concentrate on end-user business goals and needs. In the initial stages, users are connected to the
definition/development of functional requirements using survey letters, design alternatives, and
prototypes of varying degrees of readiness. They collect valuable information, giving users a sense of
direct involvement in the design process and gaining their trust.</p>
      <p>
        A well-known method of analysing textual information is that content analysis is a standard research
method in the social sciences (Fig. 42, Table 7-9). The subject is the analysis of the content of text arrays
and communicative correspondence (comments, forums, electronic mail, articles, etc.). The concept of
content analysis is not uniquely defined [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], so systems built on different approaches are incompatible.
Applying the content analysis to e-commerce content systems offers several benefits for simplifying your
business and resolves some problems facing business process participants, namely:
1. Filtering user content on an information resource;
2. The ability to automatically create a portrait of a regular user based on the analysis of his
comments;
3. The ability to automatically create a "portrait" of the target audience based on the analysis of
"portraits" of regular users;
4. Reducing the number of moderators of the information resource in the ECS;
5. Reducing the time for posting user content on an information resource due to its automatic
processing, not by moderators;
6. Elimination of the language barrier due to the automatic formation of dictionaries of regular users
and automatic translation.
      </p>
      <p>Definition
The method of objective qualitative and systematic research of the content of</p>
      <p>communication media
Systematic quantitative elaboration, evaluation, and interpretation of the form and
content of the information source
V. Ivanov
B. Krasnov
E. Tarshish</p>
      <p>The qualitative and quantitative method of document research (characterized by</p>
      <p>the objectivity of conclusions and rigour of the procedure) and quantitative
processing of the text further interprets the results. The subject of the study - the
problems of social reality, which are expressed and hidden in the documents, and</p>
      <p>the internal laws of the object of study
It consists of searching in the text definite meaningful concepts (units of analysis),
identifying the frequency of their appearance and correlation with the content of</p>
      <p>the whole document
Research technique for obtaining results by analysing the content of the text about
the state and properties of social reality
number of units of this category, T is the total
number of units) and a comparative analysis of
the relevant topics is carried out to further
predict events, processes.</p>
      <p>
        Most definitions of content analysis are constructive, that is, procedural (Table 7). Due to different
initial approaches, they generate different algorithms, which are sometimes contradictory [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The most
questionable is the neglect of the role of context (Table 8). The practical importance of the method avoids
many contradictions. Rev ' union means, and methods of natural selection and repeated evaluation of the
results obtained provide the opportunity to release or confirm factual knowledge and power/utility toolkit
(tab. 9). Content analysis is a quantitative and qualitative analysis of text arrays for further meaningful
interpretation of the obtained quantitative and qualitative patterns. The method is to create from a variety
of text an abstract model of content. It is used to analyse sources invariant by structure/content in the form
of unsystematic, disorderly organized text [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>The content analysis of commercial text content is used to determine the tone of the text, duplicate
content, and spam and identify new events to identify thematic plots of text content.</p>
      <p>
        Content analysis is used to study sources invariant in structure/content and existing as non-systematic,
disorderly organized textual material [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The method of content analysis is to form from a variety of text
material abstract models of the text's content. There are two methods of content analysis: quantitative and
qualitative. In a study of the mechanisms of generating textual information, it is found in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] that the
choice of a text description model depends on constructing a probabilistic linguistic test and organizing
the selection from the text of its units. Probabilistic modelling of textual information and its components
is an introductory, preparatory stage for describing the functions of linguistic units in the text. The study
of language and speech functioning through probabilistic modelling of content relies on quantitative
linguistics, probability theory, mathematical statistics, information theory, and combinatorics. In
linguistic studies, especially during the implementation of content search algorithms [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], there are
constant problems associated with predicting the occurrence of a certain number of word-forms/phrases
in specific classes in a segment. Probabilistic modelling of text and syllables, word combinations,
grammatical categories allows determining the sample required to provide the corresponding linguistic
unit [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Quantitative evaluations of content information in text, words, and phrases (Fig. 5, a) are obtained
based on the meaning of syntactic information and using the idea of contextual conditioning [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
a) b)
Figure 5: Mechanisms a) research and b) content formation
      </p>
      <p>
        During the experiment of guessing letters of unknown text in work [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], it was noticed that the
participants of the investigation make their hypotheses about the most probable continuation of the text,
based on two types of combinatorial constraints: combinatorics of figures (letters and syllables) and
combinatorics of signs (morphemes, words, words ). The experiment shows that even at the fourth or fifth
letter steps, the combinatorics of letters and syllables are suppressed by the constraints related to the
compatibility of morphemes and words. As the text is expanded, word combinations are compounded
with word combinations and sentences, and restrictions associated with the combinatorics of paragraphs,
chapters, book sections, or articles appear. Thus, when guessing letters located at a sufficient distance
from the beginning of the text, the experiment participant relies not on the statistical combinatorics of
letters and syllables but on the text's meaningful (lexical-grammatical) construction. Suppose the content
removed from the original text section acts as a quantitative assessment of the distribution (distribution)
and letter statistics. In that case, the syntactic information obtained from the outer areas of the text serves
as a reflection of meaningful (semantic-pragmatic) information. These considerations make it possible to
propose a content analysis method for quantifying meaningful information in text and its segments. In
identifying new events, stream content consistently to the input ECCS using scanning or content router
and thematically selected results (Fig. 5, b) identify new developments in the content description [
        <xref ref-type="bibr" rid="ref2 ref8">2, 8</xref>
        ].
For them, they form story chains of similar content [
        <xref ref-type="bibr" rid="ref10 ref8 ref9">8-10</xref>
        ]. Content that reflects new events is the basis
of interdependent content clusters (Table 10) [
        <xref ref-type="bibr" rid="ref11 ref12 ref13">11-13</xref>
        ]. Each set can be the basis for the formation of a
complete story chain.
      </p>
      <p>
        Determining the content tone based on text analysis is more complex than detecting spam. When
seeing spam, consider two hypotheses (spam, not spam) and select the vibrant colour style (positive,
negative, neutral) and their combinations. The Bayesian method uses spam databases to determine spam,
two content corpses, one of which is made up of spam and the other is not [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. For each content, the
frequency of use of each word and the weight rating (0 to 1) are calculated, that is, the conditional
probability that the content with that word is spam [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Weight values close to ½ are not considered in the
integrated calculation, so talks with such weights are ignored and deleted. The hypothesis space contains
the Tonality  H1 (negative), Tonality  H0 (neutral) and Tonality  H1 (positive) key. In the case of
hypotheses H from the set with a positive tone, choose the terms specific to this content. They choose
1
words t with a probability calculated by Bayes formula and greater than ½. Decisions about the content
tonality are made considering the difference between the values of the weighted estimates of the
hypotheses H1 and H1 [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. According to the Paul Graham method, if the content n contains terms with
the weighted forecast w1,..., wn , then the conditional probability of spam occurrence [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref9">9-12</xref>
        ] is based on
the data from the evaluation bodies and is calculated as
      </p>
      <p>Spm  wi / wi  1 wi  .</p>
      <p>
        If S is an event that is that list is spam, A is an event that a letter has contains the word t. According to
Bayes’ formula [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>P  S | A </p>
      <p>P  A | S  P  S 
P  A | S  P  S   P  A | S  P  S 
.</p>
      <p>To detect such content ci and duplicate c j , the rule of reflectivity is valid, but the condition of
transitivity is not fulfilled ci
c j , c j
ck  ci</p>
      <p>
        ck . The content is similar to the text in the mix that
includes it, but the combination is not like it. Alternatively, content identical to the other two is compiled,
but the originals are significantly different. For the duplication relation, symmetry and transitivity are
performed, that is, ci  c j  c j  ci and ci  c j , c j  ck  ci  ck . The relation of reflexivity, symmetry,
and transitivity is related to equivalence [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7 ref8">1-8</xref>
        ], i.e. the relation of duplication. Each content ci according
to the above algorithm of coincidence of terms in signatures is assigned a vector with elements [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]:
a11 a1n
1, ci  c j , , at UB  .............. .
aij  
0, інакше,
an1
ann
      </p>
      <p>In the analysis of similarity criteria, the conditions of symmetry i, j : aij  a ji and transitivity are
used i, j, k : aij  1, a jk  1  aik  1, changing the volume of comparison terms to find the
corresponding coefficients [110-111], i.e.</p>
      <p>  N N   N N    N N N   N N 
    a ij a ji     aij   0 and      a ija jk a ik     aij   max ,
  i j   i j    i j k   i j 
where N is the amount of content. The asymmetry coefficient is associated with the definition of
duplicates approximately and the transitivity level with completeness.</p>
      <p>
        When new events are detected from a content stream sequentially fed to an ECCS input from a scanner
or content router and selected on a thematic request, recent events are described in the content [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref9">9-15</xref>
        ]. For
them, they form story chains of similar content. Content that reflects new possibilities is the basis of
interdependent content clusters [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref9">9-12</xref>
        ]. The collection becomes the basis for the formation of the story
n
chain ut  simci , Dictionary  , ut   sim ci , Dictionary   , where n is the volume of content
1 2 j2
flow; c1 is current content; cn is the latest content; ci is i the content; Dictionary is the dictionary;
sim ci , c j  is a measure of the content's proximity i to j; simci , Dictionary is a measure of the closeness
of the content to the dictionary,  and  are empirically determined parameters [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. If the content is a
plurality of terms ci  wik  w : wci , then ci  c j  w : w  ci | w  c j it is the union of terms from
the content ci and c j into a vector Ei  eik  of dimension N, which is defined as
e11 e1n
1, wik  ci , that is E  .............. .
eik  
0, wik  ci ,
en1
enn
The proximity measure is given
      </p>
      <p> N 
sim ci , c j    eike jk  N .</p>
      <p> k1 </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], the proximity apparatus uses a conditional probability apparatus (the entry of some term w into
the content ci , provided that it is included in the content c j ).
      </p>
      <p>
        To develop ECCS, a Web Content management system, CMS [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1-3</xref>
        ], if it meets a specific set of
requirements (Fig. 6). CMSs do not support the entire life cycle of the content stream and do not solve
the main problems of information resource development is content creation and maintenance [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The
main disadvantage of CMS is the lack of communication between the input information, the content and
the output information (Fig. 7) [14-18].
      </p>
      <p>
        Usually, such systems are used to store and publish a large amount of content (documents, images,
music, videos, etc.). Such CMSs allow you to manage text and graphics content by providing users with
convenient tools for storing and publishing information. CMS is a tool (Table 11) for modelling the
branched structures of information resources in the SEC and managing their content [
        <xref ref-type="bibr" rid="ref1 ref10 ref11 ref12 ref13 ref2 ref3 ref4 ref5 ref6 ref7 ref8 ref9">1-13</xref>
        ] without
special technical skills such as programming or HTML layout. CMS is developed to generate content
using dynamic collection and content caching, so its safety [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. CMS provides control over access to the
information resource and changes and aims to simplify managing the information resource while
maintaining the flexibility of settings and management. The main components of the information resource
in CMS are presented in Table 12 [14-18].
      </p>
      <p>Name
systems
manage
ment
content
Ruby on</p>
      <p>Rails
Drupal
Mambo
Typo3
Movable</p>
      <p>Type
Word
Press</p>
      <p>Text
Pattern
Joomla!</p>
      <p>Software Requirements
Webserv</p>
      <p>er
Apache,
FastCGI
Apache</p>
      <p>IIS
Apache</p>
      <p>IIS
Apache</p>
      <p>IIS
Apache
IIS, Jetty
Apache,
mod_re
write
Apache
Apache</p>
      <p>Databa</p>
      <p>se
MySQL,
Postgre</p>
      <p>SQL
MySQL,
Postgre</p>
      <p>SQL
Apache</p>
      <p>IIS
Apache</p>
      <p>IIS
Apache</p>
      <p>IIS,
Jetty
Apache
Apache
MySQL</p>
      <p>Langu
age
Ruby
PHP
PHP
PHP
Perl
PHP
PHP
PHP</p>
      <p>Eas
y to
inst
all
+/–
+/–
+
+
+
+
+</p>
      <p>Learn
ing
curve
+/–
+/–
+/–
+/–
+</p>
      <p>Session
manage
ment
+/–</p>
      <p>User
manage
ment
+/–</p>
      <p>Extensi
bility</p>
      <p>Scalab</p>
      <p>ility
+/–
+
+
+
+
+
+
+/–
+/–
+/–
+
+
+
+
+
+/–
+/–
+/–
+
+
+
+
+
+</p>
      <p>In
use
of
the
mes
+/–
+
+/–
+/–
+/–
+/–
+/–
+</p>
      <p>Using CMS does not require software installation. They use a browser for editing and administration.
The intuitive interface and ease of use of the system make it easier to manage the information resource
and reduce its cost. [14-18]. CMS includes the following features: rapid updating and retrieval of content
in an information resource; collecting customer and lead data; forming and editing polls; analysis of
information resource visit. There are large streams and volumes of different content in ECCS. Most of
these streams of content drawn from easily formalized and automated procedures and commercial
content. However, there is no overall approach to formalizing, designing, developing and implementing
the ECS. Such systems do not describe or disclose the relationships and dependencies between input data,
commercial content, output data and processes of processing information resources (Table 12).</p>
      <p>The value of the content determines its attractiveness to the consumer. Integrating content makes an
attractive resource and the integration of applications - useful [14-18]. Using CMS does not require
software installation. They use a browser for editing and administration. The intuitive interface and ease
of use of the system make it easier to manage the information resource and reduce the further costs of
maintaining it. [14-18]. CMS includes the following features: rapid updating and retrieval of content in
an information resource; collecting customer and lead data; forming and editing polls; analysis of
information resource visit.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Materials and methods</title>
    </sec>
    <sec id="sec-4">
      <title>3.1. Content management tools in e-commerce</title>
      <p>Several content lifecycle models (Tables 13-14) are proposed and described by several authors with
properties supported set by different technologies and processes [19-29].</p>
      <p>Volume, sphere, space, size
System of definitions or semantics of language; subject matter/question formed
in the form of a book or document; part of the language being examined, for
example, content in a sentence - noun or verb; the information conveyed in a</p>
      <p>conversation and easily perceived after reading and analysing.</p>
      <p>Encoded format for displaying melons, such as password hash or private/public</p>
      <p>key for network communication.</p>
      <p>Published material that is legally protected by copyright through free licenses.</p>
      <p>Published material free use based on creating material for publications
An object that contains contextual information (explaining an area or its</p>
      <p>meaning, explaining the difference between objects)
The content of the document, for example, the contents of a scientific book or</p>
      <p>administrative document
The object of an information resource of predefined form; text content on the</p>
      <p>Website</p>
      <p>Features of the model
Web Content Management has four levels of hierarchy: content,
activity, output, and audience to illustrate WCM latitude [23]</p>
      <p>The build stage is the collection, creation, and editing,
management, workflows, reconciliation, versioning, archiving,</p>
      <p>syndication, metadata management [19]
Knowledge, content and map information are suitable for three</p>
      <p>key processes: creation, editing, publishing. Creation is an
approximate definition of knowledge for a particular idea or set of
ideas. Editing is the process of modifying professional content
with these ideas in mind. The publication is the submission of
content to the right person at the appropriate time. The creating,
editing and publishing processes are required to generate content
benefits. Thus, the benefits of content are described by the</p>
      <p>formula: ContentBenefit  Create  Edit  Publish. [22]
The module covers the concept of metadata. She is deeply
immersed in terms of metadata and how it should be used.</p>
      <p>Focuses is on data legalization, database searching, and
information transformation into knowledge. The author gives an
idea of the correspondence of information accumulation to a
solid and stable information model. She describes a merger of
usability ideas, information architecture, and content
management in the model to focus on end-users [20].</p>
      <p>The creation phase consists of planning, designing, authorization,</p>
      <p>and verification. A unified content strategy is a systematic
method of identifying all the major content requirements to
create consistently structured content, reuse, manage recognised
content sources, and edit content based on user requirements
and needs [26].</p>
      <p>The author paid particular attention to the process of managing</p>
      <p>Web content, including collecting versions and simultaneous</p>
      <p>changes [24].</p>
      <p>The archiving stage consists of the sub-stages of accumulation,</p>
      <p>archiving, recycling. In addition, this model reflects three
significant aspects of Web content flow: status, process, and role
(author content, quality management content, quality</p>
      <p>management process, management records).</p>
      <p>The model's focus is on the ability to organize the collection,
management, storage, accumulation, and supply of the necessary</p>
      <p>information to the right people at the right time.</p>
      <p>Each stage is divided into sub-stages. For example, the planning
stage consists of sub-stages of alignment, analysis, modelling,
design. Stage of development - creation, collection, collecting,</p>
      <p>
        classification, editing [
        <xref ref-type="bibr" rid="ref11 ref12 ref13">11-15</xref>
        ].
      </p>
      <p>The model is based on the principle of seven +/- two. That is, it
allows making changes (increase/decrease the number of stages)
in the model itself, depending on the purpose of Internet</p>
      <p>marketing.</p>
      <p>In the model, the focus is on the categories of problem-solving
rather than the very stages from the initial (content creation) to
final (content publishing). Most content management issues fall
into one of the following categories: legal content migration,
reasoning template, content creation and reuse, controlled
version and site rollback, content and end rotation, process</p>
      <p>monitoring, and success management (results) [25].</p>
      <p>This model focuses on content strategies, provides a high-level
overview of the benefits, roles, activities, and outcomes
associated with strategy content. Model Purpose: Web
consulting, design, and industry development describes processes
and methodologies applied to all types of content: text, images,
video, and audio [21].</p>
      <p>
        In some content lifecycle models (Table 15), project management concepts, information management,
information architecture, content strategies, Web site management, and semantic printing are provided
30-38]. Different authors suggest different stages of the content lifecycle [49-54]. The main steps (content
creation, development, viewing, distribution and archiving) are present in almost all proposed models
[55-64]. The lifecycle of processes, actions, content status, and content management role differ in models
depending on organizational strategies, needs, requirements, and capabilities [
        <xref ref-type="bibr" rid="ref11 ref12 ref13">11-29</xref>
        ].
      </p>
      <p>Web Content Lifecycle Models 1-7 do not solve the problems of content creation and implementation,
and they do not solve all of the issues of managing a convention, for example:
 Submitting a plurality of content to an end-user according to their request, history or data portfolio;
 Generation of digests and user or content portraits;
 Automatic discovery of thematic subjects;
 Construction of tables of the interrelation of concepts;
 Calculation of ratings of terms;
 Collection of information from different sources and its formatting;
 Identification of keywords and concepts of content;
 Content categorization, identification of duplicate content, selectively distributing content.</p>
      <p>Models 8-10 successfully cope with content management issues and some content generation issues
but ignore content implementation issues. Models 11-12 solve content generation and content
management issues and partially address content implementation issues. Not all of these models support
Web 2.0-3.0 (Table 16) [66-75].</p>
      <p>Create software for the Web;
Software - service, application;
open-source, API, open-source
software; The software may be</p>
      <p>free; software over the equipment;</p>
      <p>search for applications already
invented; eternal beta; alternative</p>
      <p>means of perception.</p>
      <p>Database replenishment - having
one becomes immediately</p>
      <p>accessible to everyone;
the data is organized in a volatile
manner; data usage tools - APIs;</p>
      <p>automatic two-way links
submission form - blogs; dynamic</p>
      <p>site; the address has a trace
element of content; the source is
the collective mind; an interface for
handling data across the network;
"Free" GNU FDL license; content is
not required to visit the site - read</p>
      <p>RSS feeds.</p>
      <p>Network as a single
collective mind,</p>
      <p>content
atomization,
aggregation,
syndication.</p>
      <p>Collaboration through the Software</p>
      <p>Support Department; interacting,
adding properties, values, creating</p>
      <p>shared content with each
participant; self-service based on
the partner architecture of the</p>
      <p>service, which is merely an
intermediary between users using
their resources; small many</p>
      <p>numerous transactions.</p>
      <p>Value in the database - the
database owner and services to
work with them make money; The</p>
      <p>Internet is valuable as a
communication tool.</p>
      <p>Cooperation;
amateur; single
mass relationships
Working with the
database; service,
not product; saving
time and attention</p>
      <p>
        A well-known content management tool is the Content Management System (CMS), software for
organizing Websites or other Web resources or individual computer networks [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7 ref8 ref9">1-9</xref>
        ]. CMS must meet
certain requirements set (Fig. 8). Usually, such systems are used to store and publish a large amount of
content (documents, images, music, videos, etc.) [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13">10-13</xref>
        ]. Such CMSs allow you to manage text and
graphics content by providing users with convenient tools for storing and publishing information. In Fig.
8, b is a CMS classification [14-18]. CMSs do not support the entire content lifecycle and do not solve
the main problems of Web resource development - content generation and implementation. The main
drawback of CMS is that there is no link between the input, content, and output. CMS is often used for
the construction of SEC and ECCS (Table 17-20), such as online newspapers (Fig. 9, a) [14-18]. Web
Content management system, WCMS developed to generate content within portals with the same
problems (dynamic collection, caching content, security, etc.) and other Web applications [76-83]. The
value of the content determines its attractiveness to the consumer [84-99]. Content integration makes
portals attractive and application helpful integration. As users are increasingly drawn to portal
applications, there are more and more applications, including ECM. The WCMS admin panel allows you
to change/add new information for different language versions of the Web site [100-112]. Changes to the
site are displayed immediately after making and saving.
Manually or by the number of
recent orders compared to
other charges or periods
      </p>
      <p>By orders, visits, and
comments; a limited number</p>
      <p>of product attributes for
analysis; comments do not
capture the opinion of the</p>
      <p>audience</p>
      <p>Impossible;
a short description is formed
manually
Impossible</p>
      <p>Impossible
It does not significantly affect
the increase in sales of goods</p>
      <p>Automatically
(programmatically),
application of known methods
of research of information on</p>
      <p>ageing</p>
      <p>Automatically
(programmatically),
application of known methods
of information research for</p>
      <p>relevance
On content orders and
content, page views and</p>
      <p>comments
For example, the automatic
generation of descriptions
(digest, i.e. brief content) of
articles in an online newspaper</p>
      <p>For example, it may be
possible to generate a new
article in an online newspaper
from a trusted news source.</p>
      <p>Such as, for example,
automatic formatting of
articles in an online newspaper</p>
      <p>according to audience class
(age, gender, profession, etc.).</p>
      <p>Significantly affects the level of
subscription of goods.
where m t  is part of the helpful information in the total flow over time T , the first
denial corresponds to the stem and flax resources, and the second - dynamic (news).</p>
      <p>Content dynamics in the network is conditioned with many factors that cannot be
accurately analysed. Within modelling, a reasonable assumption is the general
nature of the temporal dependence of the number of thematic publications
determined by simple laws. For more adequately support should refer to the</p>
      <p>complex of about actually.</p>
      <p>C  TF, IDF  . The model described by the equation C  TF * IDF where TF is the
local frequency Terms (Term Frequency, level of significance of terms within the
content), and IDF is the reciprocal frequency of the message throughout the stream
of content that E s tit this term (Inverse Document Frequency, level of uniqueness
Term throughout the content stream). The product of these values - a criterion for
determining the significance of what was the (weight). Content (messages, news) is
ageing, losing its relevance with an intensity determined by some empirical law. For
illustration, let's assume that it's exponential law. One of the suggested approaches
to that pare of generalization, such as message ranking, is the use of dependent
parametric factors. For example, it is determined the weight of the message as the
product multiplication TF * IDF * et . Value  is some constant, t is the length of
time that has elapsed since the notification in the stream of content. Value  is a
factor n and the half-life relevance of content. If the expected use exponential
model is et  1 2 determined with expert route by which the message through
ageing loses its significance in half. Accounting for content ageing (loss of some
relevance) is of great importance in analytical studies, the creation of information
products (information portraits), the central storylines of events, and the ranking of
information retrieval systems. An approximate estimation of the rate of content</p>
      <p>ageing is of practical value in determining the set of topical content.</p>
      <p>C  Y,T,T0,V  . Management Dynamics thematic content (relevance/ageing) is done
linearly. The number of messages in the time t described by the formula
y t  y t0   v t  t0  where y t  is some notes at a time t , v is the average speed of</p>
      <p>increase/decrease of content intensively in time (e.g., due to ageing). Content
component content quantitatively assessed as fluctuation (deviation from but he mi)
stream content. It is change the default critically departed
i
 ti   1iy tk    y t0   vti  t0 2 . With change  t  process of changing the subject
k0
content is a process independent of magnification (do not include links to the
previous content).In case of standard deviation by time such as  tt , the bigger
 (degree of connection between random events  12;1 ) the higher is the
described by dependency N t  N t0ett0  , where  is the average relative change
in the intensity of the content stream. With a shift in power at a specific time
 ti   N ti   N ti1/ N ti1 . Change the value fluctuations  ti  about the mean</p>
      <p>i
options ti   1i tk  2 . When changing  t  as a square root of time, the</p>
      <p>k0
process is independent increases (correlation between individual and m content is
insignificant). A significant amount of dependent content is valid  tt within the
range  12;1 , which indicates the presence of long-term system memory. Such
systems make class-similar processes taking into account correlations between</p>
      <p>content at different times.</p>
      <p>C  N ,T , M  . Generators of content in most operating in a steady-state
characterized by maximum content space capacity N (the dimensionality of the
parameters and their measurement are not taken into account). Each organization
generator generates a stream of content on average constant for the number of
signs and messages of Laziness. Over time, only the volume of notes on a topic
changes. Increased number one topic content accompanied in decline in the range</p>
      <p>T M
of another issue because T we ni tdt  NT were the amount of content per</p>
      <p>0 i1
unit of time and the total number of all the possible problems. The part is ni t
always 0.</p>
      <p> w
C  W , D  . Weight content is defined as WD  wD where WD is weight content w is</p>
      <p>D
weight keyword content (it is a monotonically increasing function of n ) D is the
number of keywords in the content ( 1  D  12 ). Average weight University and
locally keyword are wn  n / v n  n1 / K where n is the total number of words</p>
      <p>stream K is the number of unique words.</p>
      <p>
        Using a CMS does not require installing special software in the workplace. They use a regular browser
(Google Chrome, Internet Explorer or Opera) for editing and administration. The intuitive interface and
ease of use of the system make it easier to manage the site and reduce the further costs of maintaining the
Web resource. To work with the design, you need only have basic Internet skills. The most popular CMS
is Drupal and Joomla! When considering the content item dynamics at current content in the county
limited models (Table 19-20) that paves the way for further research [
        <xref ref-type="bibr" rid="ref1 ref10 ref11 ref12 ref13 ref2 ref3 ref4 ref5 ref6 ref7 ref8 ref9">1-18</xref>
        ]. Content management models
are designed to determine the ageing/relevance of content flow. They do not solve the problems of content
creation, implementation, and they do not solve all content management problems:
 Submission of a plurality of content to the end-user according to his / her request, history or
portfolio;
 Formation of digests; automatic information portraits;
 Automatic detection of thematic subjects;
 Automatic construction of tables of the interrelation of concepts;
 Calculation of concept ratings;
 Automatic collection of information from various sources;
 Automatic formatting of information;
 Automatic detection of keywords;
 Automatic content categorization;
 Duplicate detection and selective dissemination of content;
 Attract potential users.
      </p>
      <p>Fig. 8 is a graphical diagram of a typical regional information resource developed by CMS Joomla!
Apply method and online marketing for the analysis of Web resources in the region. Fig. 10 shows IDF0
diagram of a typical regional information resource.</p>
    </sec>
    <sec id="sec-5">
      <title>The most effective methods of attracting potential customers</title>
      <p>Forms on the information resources of some advertiser-friendly are due to both. They have the right
to send their contact details and additional information about the products/services of the advertiser.
Persons who have provided information through such forms on an advertiser's information resource are
potential customers. Analysing this data and using it effectively helps build a profile for your possible
audience. To do this, you must use the following methods.</p>
      <p>1. Optimize your AdWords campaigns. After clicking on the ad, visitors expect to take some action
on the landing page. The visitor must have the right idea of what he can expect before clicking on an
advertisement. For this optimization campaign AdWords, will establish rates for the required keywords
if necessary using negative keywords (search terms reports analysis), uses UT accurate yet descriptive
and engaging ad text and set up conversion tracking. Tracking the landing page bounce rate and
conversion rate and comparing them to different variations of ad text that drives traffic to the page can
help you determine how well your ad was performing (Fig. 11).</p>
      <p>2. Landing page optimization. When a visitor lands on a landing page, their expectations must be
met or exceeded. Goal pages will upload fast; transitions between them should be convenient and satisfy
you with Google's landing page. To expand the client base with the use of forms, landing pages have to
be done very simply and understandable. Visitors landing page may feel uncomfortable providing their
information if they think the site is trustworthy. Reducing the amount of information a visitor needs to
enter and solely requesting the information they need to continue communicating with the visitor will
increase the likelihood of completing the form. If a visitor starts filling in your paper but then decides to
leave before submitting (such as the form is too long), the program Web - analysts register it as a rejection.</p>
      <p>3. Involvement of interested clients. Not every potential customer who fills in the form will become
a real customer. There may be several reasons: the landing page is not clear; the record does not confirm
the information provided; a unique program that scans sites and distributes spam and more automatically
fills the form. Google cannot control user behaviour on the site. In addition to optimizing your AdWords
campaign and landing page, there are several other ways to prevent bogus customers from registering on
your site.</p>
      <p>1. Add word verification.</p>
      <p>2. Enable auto-tagging in AdWords. To URL-address of the target page linked the GCLID parameter
for defined spare revision of the page because of clicking on an ad.</p>
      <p>3. Registration of applications. Each time a visitor submits a form, you can log their IP address,
GCLID parameter (if available), referrer URL, and user agent. Based on this data, you can determine if
there is traffic from ad clicks and whether there is suspicious activity. When questionable first asset of art
and visitors coming to your site via AdWords can resend to Google GCLID options or the visitor's IP
address. Google's Advertising Traffic Quality team will check your account.</p>
    </sec>
    <sec id="sec-6">
      <title>View your Google Analytics data in AdWords reports</title>
      <p>By looking at Google Analytics site engagement statistics along with AdWords performance data, you
can find out what users do after they click on your ads and land on a landing page. These statistics
submitted the following information.</p>
      <p> % New Sessions is the approximate percentage of first-time user visits.
 Pages / Session is the average number of pages viewed per session.
 Average Session Duration is the average amount of time a user stayed on the site.
 Bounce Rate. If a site visitor has viewed only one page or triggered only one event, Analytics
counts it as an opt-out. Bounce Rate is the percentage of sessions that are interrupted.</p>
      <p>This content shows how effective the content is on the content resource and helps you decide on
optimising your budget, bids, landing pages, and ad text. For example, by comparing the bounce rate and
CTR for the content group (Fig. 12), you can get an idea of how well the site meets the users' expectations
involved in the ads.</p>
      <p>For example, in Table 21 that the Topic 1 ad group has not only a higher CTR (8%) compared to the
similar Topic 2 ad group (6%) but also a higher bounce rate (60%).</p>
      <p>The means that more than half of the users who visited the site after clicking ads in topic group 1 did
not stay there to view the offers or make a purchase in more detail. Even though ad group topic 2 receives
fewer clicks, the return on investment in them is higher because users involved in this advertising are
more likely to linger on a typical regional information resource (Fig. 13).</p>
    </sec>
    <sec id="sec-7">
      <title>Analysis of indicators of refusal to visit the information resource</title>
      <p>Bounce Rate is the percentage of visitors who view only one page when they visit your site. There are
reasons number why there may be a high failure rate (Fig. 14) [120-124].</p>
      <p>The Content Report for Page A will show you three page views and a bounce rate of 50%. The bounce
rate will not be 33% because Thursday's page-view A is not considered in the bounce rate calculation. A
speech is a session in which there is only one interaction with the visitor. The bounce rate for a page is
only relevant when a session starts from this page. Now let's examine the performance and failure rates
for a group of days with one session on the site [120-124].</p>
      <p>Below are the calculated percentages of outputs and failures [120-124]. Output metric:
Bounce Rate:</p>
    </sec>
    <sec id="sec-8">
      <title>Goal Conversion Rate</title>
      <p>For chosen objective i , where i  1,20 , this figure represents the percentage of visits that resulted in a
conversion (this goal). Transformation occurs when a visitor reaches a destination. There are three types
of plans [120-124]:
 The destination URL is the page that visitors see immediately after the action is completed. To
sign up for an account, thank you for registering or thank you for your purchase page or a receipt
page. This goal initiates a conversion when a visitor views the specified page.
 Site Time is the time limit you specify for a site moderator. When a visitor spends more or less
time on a site than a specific time limit, a conversion is made.
 The number of pages viewed per visit allows you to determine the page-view threshold. When a
visitor views more or fewer pages than the limit, the conversion is completed.</p>
      <p>Goals and Funnels is a versatile way to determine the success of an information resource or program
based on your goals. The funnel can be used to specify the expected traffic path to reach a goal. The
combination of goals and funnels allows you to analyse how effectively a site or program is driving users
toward the goal. Each time a user action meets a goal, a conversion is recorded in Google Analytics. If
you set a goal value in monetary terms, your conversion data will also contain the corresponding values.
Goals with Goal Completions (i.e. Goal Completions Levels) can be viewed in Goal reports. You can
also analyse goal completion conversions with other messages, including visitor reports, traffic, Site
Search reports, and event reports [120-124].</p>
      <p>There are four types of targets to choose. When a visitor completes a selected action, a conversion is
triggered and recorded in goal reports. You can choose the type of tracking goal you want from the list
when setting up goals in your account [120-124].</p>
      <p> Destination URL: The address of a specific placement, such as a web page (or virtual page) or
application screen that has been downloaded. Thus, a webpage or screen of a sign-up application
can be a destination for an e-commerce campaign to identify potential customers. This goal goes
well with the sequences.
 Visit Duration: Visits that last for a fixed time or longer. You can use this goal to determine the
number of visitors who stay on the page or purchase screen for more than 2 minutes.
 Pages / Visits (For Web Pages) Screens / Visits (For Applications): A visitor views a certain
number of pages or screens during a session. Uses UT this type of goal when you want to capture
visitors who see, for example, less than three pages.
 Event: The visitor triggers an action that the moderator defines as an event (such as a social
recommendation or an ad click). You must first set up Event Tracking before setting up a Goal of
this type.</p>
      <p>Goals are automatically grouped in sets, but the moderator determines which plans should belong to
each location. Uses UT sets to categorize the different types of goals for the site. You can track downloads,
signups, and receipt pages in separate goal sets. Goals are set at the profile level (up to 20 in a single
profile). Each profile can create four groups with a maximum of five goals. To track more than 20 goals
for a website or program, create a new profile for that property [120-124].</p>
      <p>When setting goals conversion value of a dollar, each time the goal is reached, that number will be
logged. Then, all cases of the registered number will be added and displayed as Goal Cost. Any action
taken by a user on a website or program can be carried over in dollars. One way to determine the value
of a goal is to calculate how often customers who have reached a goal become customers. If the sales
team is addressed by 10% of subscribers to newsletters, and the average transaction amount is 500, then
the cost of a subscription to newsletters can be set at 50 (i.e. 10% of 500). Visitors reach their goals when
they go to the last sign-up page. However, if only 1% of all subscribers make a purchase, then the cost of
the Newsletter subscription can only be assigned a value of five. Although it is unnecessary to set prices
when setting goals, they use this option to estimate weight and profit from any visitor interaction with the
site. System Google Analytics also uses the Goal Value data to calculate other indicators such as return
on investment (ROI) and average. You can use the funnel to specify the expected traffic path to reach
your destination. Focusing on the steps of the funnel fixed by the moderator, Analytics tracks the times
when visitors come and leave the goal. This WMS to obtain valuable information about the site. For
example, you could identify a page in a funnel that captures many exits on the way to a goal, indicating
problems with that page. If there are many missed steps, this will display difficult navigation or too many
conversion paths with many unnecessary steps. Funnels can only use in conjunction with a destination.
The last page in the funnel is a goal page (entered as a goal), while the previous pages form a funnel. If
the goal of the funnel is to attract leads, then the first page of the funnel can be assigned the URL of the
contact request form, and the landing page is the URL for the thank you page for the request that is
displayed after the user requests the contact [120-124].
3.6.</p>
    </sec>
    <sec id="sec-9">
      <title>Calculation of indicators</title>
      <p>1. "Compared to homepage" metric. This metric compares the conversion rates of the experiment
page and the original page [120-124].</p>
      <p>The following formula makes the comparison:
 рейтинг конверсій експериментального варіанта

 рейтинг конверсій початкового варіанта
For example, if case Variation effective than the original:
 Experiment Conversion Rate = 35%
 Initial conversion rate = 25%</p>
      <sec id="sec-9-1">
        <title>Then, value index n is compared to your original  35  1 100  40 %.</title>
        <p> 25 
If the experimental variant is less effective than the original variant:
 Experiment Conversion Rate = 20%
 Initial conversion rate = 40%</p>
      </sec>
      <sec id="sec-9-2">
        <title>Metric value Compared to % original page  20  1 100  50 .</title>
        <p> 40 </p>
        <p>The assist-to-recent conversions ratio results are from dividing the number of conversions. If a channel
has repeatedly played an ancillary role on the path to one conversion, only one conversion is counted as
an associate conversion for the metric. Associated conversions for different channels do not exclude each
other. Associated conversion is taken into account for all channels that have an ancillary role in one
conversion path [120-124].</p>
        <p>To view a subset of conversion funnels, you need to apply conversion segments instead of filters with
filters. Using a filter profile can adversely affect the accuracy of Multi-Channel Funnels reports. Using
means the creation of conditions to specify the conversion paths to be included in the segment. For
example, to set up a conversion segment that contains only conversion courses that begin with
example.com, you must specify the following [120-124].</p>
        <p>An Attribution Model is a rule or set of rules that defines how credits for sales and conversions are
assigned to touchpoints with audiences in the path to conversions. For example, the Last Engagement
attribute gives 100% credit to endpoints with audiences (i.e., clicks) that precede sales or conversions.
The First Engagement attribute assigns 100% credit to the audience touchpoints that begin the path to
conversions. Below is an example of attribution models. The calculated conversion value (and the number
of modifications) for each marketing channel will vary according to the attribution model. A track that is
mostly starting to drive conversions will have a higher conversion value than the Last Interaction
attribution model, thanks to its attributive First Interaction model. A customer found the site by clicking
on one of the paid ads. He returns in a week via a social network. On the same day, he produced a third
time to get the goods - this time for one campaign through email. In the Attribution Model:
 Last Interaction last touchpoint - in this case, channel email - receive 100% credit for the sale.
 First Engagement, The first point of contact with your audience, is the paid ad channel - will get
100% credit for the sale.
 Linear every touchpoint on the path to conversion - in this case, the Paid Advertising channel,
social network feeds and email - share equal credit (33.3% each) credit for the sale.
 Over time, audience touchpoints that are closest in time to sales or conversions get the most credit.</p>
        <p>In this case, email and social network channels will receive most of the credit because the customer
interacted with them on the conversion day. Since engagement with a paid ad occurred a week
earlier, this channel will receive much less recognition.
 Based on the position, 40% of the credit is assigned to the first interaction, 20% to intermediate
interactions, and 40% to the last interaction. Feeds paid ad and email receives 40% credit, and
social network - 20%.</p>
        <p>Attribution Modelling lets you compare the impact of different attribution models on evaluating
marketing channels. In the tool, select an attribution model (such as Last Interaction). Then the table will
show the number of conversions (or, depending on your choice, the cost) for each channel calculated by
the model you selected. You can select up to three attribution models at a time and compare the results of
each one in the table. After importing cost data into AdWords or other similar information, columns will
appear to help you analyse and compare the metrics. In addition to basic models, you can use attribution
modelling to create, save, and apply a custom model that uses the rules specified by the moderator. It
allows you to tailor the models specifically to the set of assumptions that need to estimate in the
conversion path data. In the "Applying Special Credit Rules" section, you can specify conditions that
determine touch points on the conversion path based on characteristics such as position (first, last,
average, assist), touchpoint type (click, impression, direct visit), and also the type of campaign or traffic
source (campaign, keyword, or other dimensions). After defining the touchpoints you want, you can
specify how you would allocate the conversion credit for those points to other points [120-124].</p>
        <p>All the rules is determined by the relative distribution of loans. For example, a linear model splits the
conversion credit equally between touchpoints. Therefore, on the way to a four-conversion conversion,
each touchpoint will receive 25% credit. However, if a paid ad channel is credited with 2 points and the
third point on the path is "Paid Ads" [120-124], the credit will be applied as follows, as shown in Fig. 15.</p>
        <p>After applying multiple rules to a single point of contact, the weight of the credit rules overlap will
multiply. The Last Interaction Model transfers 100% of the conversion price to the last channel that the
user interacted with before purchasing or completing the conversion. Google Analytics uses this default
model to pass conversion costs into reports that are not multi-channel funnels. Because the Last
Interaction model is the default model for messages that do not relate to multi-channel funnels, it provides
valuable results compared to other models. Also, suppose ads and campaigns are designed to attract
people at the time of purchase or are primarily engaged in transactions and have sales cycles that do not
reflect phase. In that case, the Last Interaction model may be acceptable [120-124].</p>
        <p>The First Interaction Model transfers 100% of the conversion cost to the first channel, with the user
interacted. This model is acceptable if you are running ads or campaigns to create initial awareness. For
example, if a brand is poorly known, you can focus on the keywords or channels that are the first to
represent the brand to the customer [120-124].</p>
        <p>Model Line distributes equal credit to each channel interaction on the conversion path. The model is
helpful if campaigns are designed to keep in touch with the customer and keep him informed throughout
the sales cycle. In this case, each point is vital for the reflection process. If the sales cycle involves a brief
reflection phase, you can use the Impairment Model over time. This model transfers most of the credit to
the touchpoints that occurred in time closest to the conversion. If you run one- or two-day advertising
campaigns, you can give more credibility to your interactions during the advertising days. In this case,
the interactions that occurred a week before the promotion would receive only a tiny fraction of the credit
compared to the touchpoints near the conversion. Over time, the Attenuation model appropriately credits
touch points during the one or two days leading up to a conversion [120-124].</p>
      </sec>
    </sec>
    <sec id="sec-10">
      <title>4. Experiments, results and discussion</title>
      <p>Fig. 16 shows a contextual diagram of data flows of a typical regional information resource, and Fig.
17 shows a detailed flow chart of a specific regional information resource. Model Position-based allows
you to combine the Last Interaction and First Interaction models. Instead of giving all the credit to the
first or last interaction, it can split between them. Typically, 40% of the credit is assigned to first and last
interactions, and 20% is to intermediate interactions. If they value more points of contact, which
introduced a user's brand and points that led to the sale, uses a model based on the position. Fig. 18 shows
an ERD of a typical regional information resource.</p>
      <p>Mathematical relation for deterministic systems in the general case [125-136]:
dy
dt</p>
      <p>For the site of the Lviv city of consider the model administrator-visitor [125-136]:
where y1 is the number of administrators, y2 is the number of visitors, Cavg is the amount of content, Call
is the total amount of content, ALL is useful information determined scale from 0 to 1.</p>
      <p>The managed system based on Lotka-Volterra equations, also known as the predator-prey equations,
looks like [125-136]:</p>
      <p>Linearization of function:</p>
      <p>Discrete-deterministic model of information system. To implement this system, you can use 1 of 2
machines: the Mealy or Moore machine [125-136].</p>
      <p>z t  1    z t  , x t  , t  0,1, 2,...;
Type 1: Mealy Machine (Fig. 19-20, Table 22-23): 
 y t    z t  , x t  , t  0,1, 2,...;
</p>
      <p>y t    z t  , t  0,1, 2,...;
request, Z2 is running of the script, Z3 is the connection to the database, Z4 is generation and delivery
of the page to the visitor.</p>
      <p>Z1
0
0.8
0
0
0</p>
      <p>Z2
0
1
0.4
0
0</p>
      <p>Z3
0
0
0
0.5
0
Zk
Z2
Y2</p>
      <p>Z3
Y3
Z4
0
0
0
1
0</p>
      <p>Z4
–
Y4</p>
      <p>Continuous-stochastic model of information system. Every day new articles and new information
are added to the database. Therefore, there is nothing in the drive at the beginning of the day. Thus, the
states of the subsystem will be described by the system of equations [125-136]:
where Pn t  is the probability of the system being in a state, zn t   Z at time t, that is, n applications,
we differentiate a system if it has n applications [125-136]:
dPn t 


dP0 t 
 dt   P0 t    P1 t 
When equating time to zero [125-135]:</p>
      <p>dt      Pn t    Pn1 t    Pn1 t 
    pn   pn1   pn1, n  1, 1    pn  pn1   pn1, n  1,
 
 p0   p0,  p1   p0.
when P1  1: pn   n 1  </p>
      <p>Network model. With the help of the network model, I will build the principle of CMS work for the
project (Fig. 21). To begin with, a user has requested a server [125-136]:</p>
      <p>Then the server transmits data to the script handler, the script itself to routing, and routing to
modularity (Fig. 22). There is the module search, GET query template.</p>
      <p>After routing, the script selects the module type (content, directory, search) shown in Fig. 23.</p>
      <p>The content type, module template, system module options, content and module itself are downloaded
(Fig. 24). The server outputs the generated page to the user in the browser.
our project, А3 is DB and
1 is a server request.
2 is the connection to the database.
3 is errors.
4 is giving the client a generated page, shutting down.
5 is data transmission via POST, GET, HEAD method.
6 is data acquisition by POST, GET, HEAD.
7 is delivery of content by criteria.</p>
      <p>Combined model. Fig. 25 shows Aggregation system [125-136], where А1 is server, А2 is CMS of
5. Conclusions
1. The analysis of ways of forming commercial content is carried out. The known models of a life
cycle of content and the standardized services of management of content give the chance to define
requirements for creating an optimum life cycle of commercial content.
2. Internet technologies for the construction of service-oriented e-commerce systems are studied,
making it possible to classify e-commerce systems and e-content commerce systems.
3. Information resources and production processes of e-commerce systems are considered in detail,
making it possible to develop an optimal content life cycle and a typical architecture of
ecommerce systems.
4. The technology of content management in e-commerce is analyzed, allowing the development of
formal models, unified methods and software tools for processing information resources in
econtent commerce systems.
5. From the standpoint of a systematic approach, an analysis of modern methods and tools for
designing, modelling, and implementing electronic content commerce systems and substantiated
the need and feasibility of creating unified procedures and software for processing information
resources.</p>
    </sec>
    <sec id="sec-11">
      <title>6. References</title>
      <p>[14] Metatorial Services, Inc., The Content Management Possibilities Poster. URL:
http://metatorial.com/pagea.asp?id=poster.
[15] EMC, IBM, Microsoft. Content Management Interoperability Services. Part II – SOAP protocol
binding. Version 0.5. Hopkinton, 2008.
[16] EMC, IBM, Microsoft. Content Management Interoperability Services. Part II – REST protocol
binding. Version 0.5. Hopkinton, 2008.
[17] EMC, IBM, Microsoft. Content Management Interoperability Services. Part I. Version 0.5.</p>
      <p>Hopkinton, 2008.
[18] EMC, IBM, Microsoft. Content Management Interoperability Services. Appendices. Version 0.5.</p>
      <p>Hopkinton, 2008.
[19] B. Boiko, Content management bible. John Wiley &amp; Sons, 2005.
[20] J. Hackos, Content Management for Dynamic Web Delivery. Hoboken, Wiley, 2002.
[21] K. Halverson, Content Strategy for the Web. Reading, New Riders Press, 2009.
[22] G. McGovern, R. Norton, Content Critical. Upper Saddle River, FT Press, 2001.
[23] S. McKeever, Understanding Web content management systems: evolution, lifecycle and market,
volume 103 (9) of Industrial Management &amp; Data Systems (MCB UP), 2003, pp. 686-692.
[24] R. Nakano, Web content management: a collaborative approach. Boston, Addison Wesley</p>
      <p>Professional, 2002.
[25] R. Woods, Defining a Model for Content, 2010. URL:
www.contentmanager.net/magazine/article_785_defining_a_model_for_ content_governance.html.
[26] A. Rockley, Managing Enterprise Content: A Unified Content Strategy. Reading, New Riders Press,
2002.
[27] W.R. Stone, Plagiarism, Duplicate Publication and Duplicate Submission: They Are All Wrong!,
volume 45(4) of IEEE Antennas and Propagation, 2003, pp. 47-49.
[28] D. Sullivan, Invisible Web Gets Deeper. Search Engine Report, 2002. URL:
http://searchenginewatch.com/sereport/article.php/2162871.
[29] CMP, CM Lifecycle Poster. URL: http://www.cmprosold.org/resources/poster/.
[30] C. Osgood, The nature and measurement of meaning, volume 49 of Psychological Bulletin, 1952,
pp. 197-237.
[31] O. Kanishcheva, V. Vysotska, L. Chyrun, A. Gozhyj, Method of Integration and Content
Management of the Information Resources Network, volume 689 of Advances in Intelligent Systems
and Computing, 2018, Springer, pp. 204-216.
[32] A. Gozhyj, V. Vysotska, I. Yevseyeva, I. Kalinina, V. Gozhyj, Web Resources Management Method
Based on Intelligent Technologies, volume 871 of Advances in Intelligent Systems and Computing,
2019, pp. 206-221.
[33] A. Gozhyj, I. Kalinina, V. Vysotska, V. Gozhyj, The method of web-resources management under
conditions of uncertainty based on fuzzy logic, in: Proceedings of the International Conference on
Computer Sciences and Information Technologies, CSIT, 2018, pp. 343-346.
[34] C. R. Rao, V. N. Gudivada, Computational analysis and understanding of natural languages:</p>
      <p>Principles, methods and applications. Elsevier, 2018.
[35] P.J. Hayes, S.P. Weinstein, Construe/TIS: A system for content-based indexing of a database of news
stories, volume 2 of Innovative Applications of Artificial Intelligence, The AAAI Press/The MIT
Press, Cambridge, MA, 1991, pp. 49-64.
[36] O. Naum, L. Chyrun, O. Kanishcheva, V. Vysotska, Intellectual System Design for Content
Formation, in: Proceedings of the International Conference on Computer Sciences and Information
Technologies, CSIT, 2017, pp. 131-138.
[37] B. Rusyn, V. Lytvyn, V. Vysotska, M. Emmerich, L. Pohreliuk, The Virtual Library System Design
and Development, volume 871 of Advances in Intelligent Systems and Computing, 2019, pp.
328349.
[38] V. Lytvyn, V. Vysotska, Y. Burov, O. Veres, I. Rishnyak, The Contextual Search Method Based on
Domain Thesaurus, volume 689 of Advances in Intelligent Systems and Computing, 2018, pp.
310319.
[39] D. Lande, O. Dmytrenko, O. Radziievska, Subject Domain Models of Jurisprudence According to
Google Scholar Scientometrics Data, volume Vol-2604 of CEUR workshop proceedings, 2020, pp.
32-43.
[40] A. Boychenko, D. Lande, Generation of Information Impacts Scenarios in Management Decision</p>
      <p>Support Systems, in: International scientific-practical conference, Springer, 2020, pp. 175-185.
[41] D. Lande, I. Subach, A. Puchkov, A System for Analysis of Big Data from Social Media, volume
47(1) of Information &amp; Security, 2020, pp. 44-61.
[42] M. Zgurovsky, A. Boldak, D. Lande, K. Yefremov, M. Perestyuk, Predictive Online Analysis of
Social Transformations based on the Assessment of Dissimilarities between Government Actions
and Society’s Expectations, in: IEEE 2nd International Conference on System Analysis &amp; Intelligent
Computing, SAIC, 2020, pp. 1-6.
[43] D. Lande, M. Fu, W. Guo, I. Balagura, I. Gorbov, H. Yang, Link prediction of scientific collaboration
networks based on information retrieval, in: World Wide Web, 2020, pp. 1-19.
[44] N., Kunanets, Y., Oliinyk, D., Kobylynskyi, A., Rzheuskyi, K., Shunevich, V. Tomashevskyi, The
Model" Information Gatekeepers" for Sentiment Analysis of Text Data, in: ICTERI, 2019, pp.
164177.
[45] M. Fu, H. Yang, J. Feng, W. Guo, Z. Le, D. Lande, D. Manko, Preferential information dynamics
model for online social networks, volume 506 of Physica A: Statistical Mechanics and its
Applications, 2018, pp. 993-1005.
[46] M. Fu, J. Feng, D. Lande, O. Dmytrenko, D. Manko, R. Prakapovich, Dynamic model with super
spreaders and lurker users for preferential information propagation analysis, volume 561 of Physica
A: Statistical Mechanics and its Applications, 2021, p. 125266.
[47] D. Lande, V. Andrushchenko, I. Balagura, Data Science in Open-Access Research on-Line
Resources, in: IEEE Second International Conference on Data Stream Mining &amp; Processing, DSMP,
2018, pp. 17-20.
[48] D. Lande, A. Snarskii, D. Manko, The Model of Words Cumulative Influence in a Text, in: XVIII
International Conference on Data Science and Intelligent Analysis of Information, Springer, Cham,
2018, pp. 249-256.
[49] V. Vysotska, L. Chyrun, Analysis features of information resources processing, in: Proceedings of
the International Conference on Computer Sciences and Information Technologies, CSIT, 2015, pp.
124-128.
[50] M. Korobchinsky, V. Vysotska, L. Chyrun, L. Chyrun, Peculiarities of Content Forming and
Analysis in Internet Newspaper Covering Music News, in: Proceedings of the International
Conference on Computer Sciences and Information Technologies, CSIT, 2017, pp. 52-57.
[51] V. Lytvyn, V. Vysotska, O. Veres, I. Rishnyak, H. Rishnyak, The Risk Management Modelling in
Multi Project Environment, in: Proceedings of the International Conference on Computer Sciences
and Information Technologies, CSIT, 2017, pp. 32-35.
[52] V. Vysotska, Linguistic Analysis of Textual Commercial Content for Information Resources
Processing, in: Proceedings of the International Conference on Modern Problems of Radio
Engineering, Telecommunications and Computer Science, TCSET, 2016, pp. 709-713.
[53] L. Vasyl, V. Victoria, D. Dmytro, H. Roman, R. Zoriana, Application of Sentence Parsing for
Determining Keywords in Ukrainian Texts, in: Proceedings of the International Conference on
Computer Sciences and Information Technologies, CSIT, 2017, pp. 326-331.
[54] P. Zdebskyi, V. Lytvyn, Y. Burov, Z. Rybchak, P. Kravets, O. Lozynska, R. Holoshchuk, S.</p>
      <p>Kubinska, A. Dmytriv, Intelligent System for Semantically Similar Sentences Identification and
Generation Based on Machine Learning Methods, volume Vol-2604 of CEUR workshop
proceedings, 2020, pp. 317-346.
[55] V. Andrunyk, L. Chyrun, V. Vysotska, Electronic content commerce system development, in:
Proceedings of 13th International Conference: The Experience of Designing and Application of
CAD Systems in Microelectronics, CADSM, 2015.
[56] L. Chyrun, Model of Adaptive Language Synthesis Based on Cosine Conversion Furies with the Use
of Continuous Fractions, volume Vol-2604 of CEUR workshop proceedings, 2020, pp. 600-611.
[57] R. Bekesh, L. Chyrun, P. Kravets, A. Demchuk, Y. Matseliukh, T. Batiuk, I. Peleshchak, R. Bigun,
I. Maiba, Structural Modeling of Technical Text Analysis and Synthesis Processes, volume
Vol2604 of CEUR workshop proceedings, 2020, pp. 562-589.
[58] K. Alieksieieva, A. Berko, V. Vysotska, Technology of commercial web-resource processing, in:
Proceedings of 13th International Conference: The Experience of Designing and Application of
CAD Systems in Microelectronics, CADSM, 2015.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
            <surname>Vysotska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Hasko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kuchkovskiy</surname>
          </string-name>
          ,
          <article-title>Process analysis in electronic content commerce system</article-title>
          ,
          <source>in: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          ,
          <string-name>
            <surname>CSIT</surname>
          </string-name>
          ,
          <year>2015</year>
          , pp.
          <fpage>120</fpage>
          -
          <lpage>123</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Su</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vysotska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sachenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Lytvyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Burov</surname>
          </string-name>
          ,
          <article-title>Information resources processing using linguistic analysis of textual content</article-title>
          ,
          <source>in: Proceedings of the International Conference on Intelligent Data Acquisition and Advanced Computing Systems Technology and Applications</source>
          , Romania,
          <year>2017</year>
          , pp.
          <fpage>573</fpage>
          -
          <lpage>578</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V.</given-names>
            <surname>Lytvyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vysotska</surname>
          </string-name>
          ,
          <article-title>Designing architecture of electronic content commerce system</article-title>
          ,
          <source>in: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          ,
          <string-name>
            <surname>CSIT</surname>
          </string-name>
          ,
          <year>2015</year>
          , pp.
          <fpage>115</fpage>
          -
          <lpage>119</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V.</given-names>
            <surname>Vysotska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.B.</given-names>
            <surname>Fernandes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Emmerich</surname>
          </string-name>
          ,
          <article-title>Web content support method in electronic business systems</article-title>
          , volume Vol-
          <volume>2136</volume>
          <source>of CEUR Workshop Proceedings</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>20</fpage>
          -
          <lpage>41</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V.</given-names>
            <surname>Vysotska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Chyrun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Chyrun</surname>
          </string-name>
          ,
          <source>Information Technology of Processing Information Resources in Electronic Content Commerce Systems, in: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          ,
          <string-name>
            <surname>CSIT</surname>
          </string-name>
          ,
          <year>2016</year>
          , pp.
          <fpage>212</fpage>
          -
          <lpage>222</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>B.</given-names>
            <surname>Rusyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vysotska</surname>
          </string-name>
          , L. Pohreliuk,
          <article-title>Model and architecture for virtual library information system</article-title>
          ,
          <source>in: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          ,
          <string-name>
            <surname>CSIT</surname>
          </string-name>
          ,
          <year>2018</year>
          , pp.
          <fpage>37</fpage>
          -
          <lpage>41</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Matseliukh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vysotska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bublyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kopach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Korolenko</surname>
          </string-name>
          ,
          <article-title>Network Modelling of Resource Consumption Intensities in Human Capital Management in Digital Business Enterprises by the Critical Path Method</article-title>
          , volume Vol-
          <volume>2851</volume>
          <source>of CEUR Workshop Proceedings</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>366</fpage>
          -
          <lpage>380</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V.</given-names>
            <surname>Vysotska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Burov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Lytvyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Oleshek</surname>
          </string-name>
          ,
          <source>Automated Monitoring of Changes in Web Resources, volume of 1020 Advances in Intelligent Systems and Computing</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>348</fpage>
          -
          <lpage>363</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>D.</given-names>
            <surname>Lande</surname>
          </string-name>
          ,
          <article-title>Basis of information flow integration</article-title>
          , Handbook, Engineering,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Vysotska</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Rishnyak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Chyrun</surname>
          </string-name>
          ,
          <article-title>Analysis and evaluation of risks in electronic commerce</article-title>
          ,
          <source>in: Proceedings of the International Conference on CAD Systems in Microelectronics, 9th International Conference</source>
          ,
          <year>2007</year>
          , pp.
          <fpage>332</fpage>
          -
          <lpage>333</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>G.</given-names>
            <surname>Salton</surname>
          </string-name>
          ,
          <article-title>Developments in automatic text retrieval</article-title>
          , volume
          <volume>253</volume>
          (
          <issue>5023</issue>
          ) of science,
          <year>1991</year>
          , pp.
          <fpage>974</fpage>
          -
          <lpage>980</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>G.</given-names>
            <surname>Salton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Harman</surname>
          </string-name>
          ,
          <article-title>Information retrieval</article-title>
          , in: Encyclopedia of computer science,
          <year>2003</year>
          , pp.
          <fpage>858</fpage>
          -
          <lpage>863</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>R.</given-names>
            <surname>Papka</surname>
          </string-name>
          ,
          <article-title>On-line News Event Detection, Clustering, and Tracking</article-title>
          . Amherst, Massachusetts University,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>