<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Application of Online Marketing Methods and SEO Technologies for Web Resources Analysis within the Region</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Volodymyr</forename><surname>Kuchkovskiy</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>S. Bandera Street, 12</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vasyl</forename><surname>Andrunyk</surname></persName>
							<email>vasyl.a.andrunyk@lpnu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>S. Bandera Street, 12</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Maksym</forename><surname>Krylyshyn</surname></persName>
							<email>maksym.krylyshyn.mnsa.2020@lpnu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>S. Bandera Street, 12</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Lyubomyr</forename><surname>Chyrun</surname></persName>
							<email>lyubomyr.chyrun@lnu.edu.ua</email>
							<affiliation key="aff1">
								<orgName type="institution">Ivan Franko National University of Lviv</orgName>
								<address>
									<addrLine>University Street, 1</addrLine>
									<postCode>79000</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Anatolii</forename><surname>Vysotskyi</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">Anat Company</orgName>
								<address>
									<addrLine>Chervona Kalyna Avenue</addrLine>
									<postCode>104, 79049</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Sofia</forename><surname>Chyrun</surname></persName>
							<email>chyrunsofia@gmail.com</email>
							<affiliation key="aff2">
								<orgName type="institution">Anat Company</orgName>
								<address>
									<addrLine>Chervona Kalyna Avenue</addrLine>
									<postCode>104, 79049</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nataliia</forename><surname>Sokulska</surname></persName>
							<email>natalya.sokulska@gmail.com</email>
							<affiliation key="aff3">
								<orgName type="institution">Hetman Petro Sahaidachnyi National Army Academy</orgName>
								<address>
									<addrLine>Heroes of Maidan Street, 32</addrLine>
									<postCode>79012</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ilona</forename><surname>Brodovska</surname></persName>
							<email>ilonabrodovska@gmail.com</email>
							<affiliation key="aff4">
								<orgName type="department">Limited Liability Company Financial Company Absolute Finance</orgName>
								<address>
									<addrLine>E. Konovaltsya Street</addrLine>
									<postCode>01133</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Application of Online Marketing Methods and SEO Technologies for Web Resources Analysis within the Region</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">4FA504E57982269F974147B82BDB90A2</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T11:56+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Content, business process, management system, SEO-technology, Google analytics, targeting, information resource, content management, typical regional information resource, search engine, internet marketing, search engine marketing, content analysis, content management system, conversion path, conversion rate, attribution model, content management interoperability 0000-0002-7941-6329 (V. Kuchkovskiy)</term>
					<term>0000-0003-0697-7384 (V. Andrunyk)</term>
					<term>0000-0002-2964-9546 (M. Krylyshyn)</term>
					<term>0000-0002-9448-1751 (L. Chyrun), 0000-0001-9190-7051 (A. Vysotskyi)</term>
					<term>0000-0002-2829-0164 (S. Chyrun)</term>
					<term>0000-0002-3425-5517 (N. Sokulska)</term>
					<term>0000-0001-8838-7788 (I. Brodovska)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This article presents the content analysis methods for information Web resources within a particular region. The model describes content analysis for processing Web resources in online marketing and simplifies the content automation management technology. The main problems of semantic and syntactic content analysis and functional services for textual content management are analysed. The rapid growth of Internet and e-business facilitates the publication and moderation of articles, which offers an intelligent system of marketing decisions to distribute content from a specific region to a particular target audience. The article describes developing information technology for processing Web resources of e-commerce based on online marketing and SEO methods. A new approach to the e-business processes application and implementation to such intelligent systems building is formulated. Processing content and information resource methods based on SEO technology and online marketing are described. Software for content and information resource processing is developed.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Available content management technology is online marketing with Public relations, information management, Internet integration, customer service and sales in various fields <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref>. Online marketing utilizes all essentials and aspects of traditional marketing in conjunction with new research methods (e.g., viral marketing) and information analysis using modern IT <ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref>. These relatively constant contact with users are effective thanks to the automatic tracking of statistics, which uses the Return on Investment (ROI), Rate of Return (ROR) and visitor efficiency to analyse or convert in e-commerce. The primary purpose of online marketing is to get the maximum effect from the potential audience of the site with the ability to demand, sales, and visits statistics, etc. <ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related works</head><p>Online marketing involves using strategies and areas of traditional marketing and the particular regions of research that apply to the Internet space e-business (Fig. <ref type="figure" target="#fig_0">1</ref>, Table <ref type="table" target="#tab_0">1</ref>). Online marketing is not only content trading but also e-business models, software, content spaces, etc. <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref>. Google, Yahoo, and MSN have taken it to the next level and segmented the online advertising market by offering e-commerce inhouse advertising services. Due to the automation of the audience research process, the return on investment is increasing, and costs are decreasing. The online marketing advantages: the possibility of the most accurate targeting (Table <ref type="table">2</ref>-4), interactivity, the opportunity of post-click analysis to maximize website conversion rates and ROR/ROI of online advertising <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref>.  In the music industry, many consumers have started buying and downloading MP3 music over the Internet instead of buying a CD Banking case</p><p>Online banking is convenient for the customer because it eliminates the need for him to visit the bank or its branches each time</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Auctions</head><p>Online auctions have gained popularity. Unique things found in flea markets are now on sale at online auctions such as eBay and more. Auction development has dramatically influenced the prices of unique and antique items.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Advertising market</head><p>The impact on the advertising industry has been and still is enormous. Over the years, online advertising has grown steadily, reaching tens of billions of dollars a year. Advertisers have begun to change their priorities actively, and today online advertising already occupies a significant market niche.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Market portable devices</head><p>It increases the volume and geography of portable electronic devices (mobile phones, players, etc.) using modern marketing methods to promote the product to the Internet market.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Ecommerce content</head><p>Increase the volume, shorten the cycle of production/sale of intangible goods, and provide relevant services.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Internet sites</head><p>Online shopping sites have long ceased to be bulletin boards, some of which have become large corporations that provide a range of marketing services. Prices for participation in such venues (privileged membership) are also increasing, despite their increasing number.</p><p>Site conversion is the ratio of the number of visitors to the site. It is who completed the targeted actions (hidden / direct instructions from advertisers, sellers, content formation, visits a particular page of a site, passing through an advertising link), to the total number of visitors site <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2 Basic Elements of Internet Marketing</head><p>Name Definition Product An object sold via the Internet through a Web site; has its price and decent quality, is in demand, competes with similar things of other Web sites and traditional stores. Price Controlled quantitative indicator of the cost of goods with the following properties: much lower than in a regular store due to cost savings; regularly compared to prices for similar competing products. Promotion A set of methods of promoting the site on the Internet and goods, which includes a vast arsenal of tools (search promotion, contextual advertising, banner advertising, e-mail marketing, affiliate (affiliate, English. Affiliate) marketing, viral marketing, hidden marketing, interactive advertising, work with blogs and more Place Point of sale (Web site), where graphic design and usability play a significant role, the usability of the site, quality of processing applications from the site, speed of loading, work with payment systems, terms of delivery, work with customers before, during and after the sale. Marketing Trends Processes aimed at creating/increasing demand and achieving e-business goals through Internet technologies to maximize customer/product needs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 3</head><p>Areas of Internet Marketing Name Characteristic Display advertising Media advertising or banner advertising An effective way to promote (increase visits) and a powerful tool to improve the image of website owners. Static/animated image ads (often Web-banner size 468 × 60 pixels), linked via a hyperlink from the advertiser or a page with more information. Together with content advertising is one of the significant formats of advertising on the Internet. Classic Web Banner -A GIF, SWF or JPG image file with static/animated image. Web banners are also created using Flash or Java technologies. Unlike traditional (bitmap) graphics, they use vector graphics to implement animation and sound effects at a small size, increasing the banner's effectiveness as an advertising medium.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Post-click marketing</head><p>An effective way to increase sales and marketing results by focusing on website visitors who are responsive to Internet marketing activities (pay per click advertising, HTML email, search to increase conversions) Targetgoal</p><p>The advertising mechanism (Table <ref type="table">4</ref>) isolates from the entire existing audience only the part that meets the set criteria (for example, the target audience) and shows the advertisement to it.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Contenttargeted advertising</head><p>The advertising principle focuses on the website content, either manually or automatically as a banner or text ad. The most robust contextual advertising -Geo-Targeting, to choose geographic display pages. Show time frame limits are also applied.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Search engine marketing, SEM</head><p>A set of measures is aimed at increasing search engine traffic. Previously, the search result meant only links to relevant pages (usually on the left side of the page). Now they include advertisements on the right side of the page. Most search engine technologies do not allow you to achieve your advertising goals: they do not always directly report the advertised product or service; do not continuously pursue the purpose of sale; with their help, it is challenging to raise brand awareness; it is not possible to bring a new product to the market. The results of using any search engine technology can be two: attracting users to the site, and for each case, the characteristics of that audience are different; disseminating information about your site or business to search engines.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Social media optimization, SMO</head><p>Optimization for social media, a set of purely technical measures aimed at transforming the site content so that it can be used as simply as possible in online communities (forums, blogs) Social Media Marketing, SMM</p><p>Promoting or promoting anything in social media (blogs, forums, online communities) Direct marketing using the e-mail, RSS and more A type of marketing communication is based on direct personal communication with the recipient (B2C consumer or B2B client) to build relationships and profit.</p><p>Direct marketing is based on the attitude towards the client as an individual, provides feedback and does not use information brokers for communication. In Western marketing, direct marketing is referred to as BTL events (below the line, used instead of ATL -direct advertising), which combines promotions, Direct email, exhibitions, POS and more. Direct marketing often uses direct mailing to the target audience via email, e-mail, SMS and more. Direct marketing is focused not on the target groups but individual individuals. Direct marketing activities require creating a database of clients -structured, constantly updated fresh information about individuals or legal entities and their consumer preferences and needs to further process this information and formulate a product offering that meets their needs. Databases in direct marketing are closely linked to the CRM concept of customer or customer relationship management, allowing you to consolidate all customer information and streamline all stages of customer relationships from marketing and sales to after-sales service.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Viral marketing and viral advertising</head><p>Guidelines are based on encouraging individuals to pass on a marketing message to other individuals that create the potential for exponential growth in the impact of the news. Like viruses, such techniques use every opportunity to increase the number of messages transmitted. Guerrilla marketing A marketing concept is that seeks to find a firm/entrepreneur in their marketing niche, refusing to compete openly with their powerful competitors, concentrating efforts on segregated areas of the front, and using non-traditional but effective ways to advertise and promote their products/services. Partisan marketing is characterized by flexibility and mobility, sometimes called lowbudget/low-cost. Aiming Precision marketing A method is for increasing Internet marketing success through the technology of retaining existing customers, cross-selling and up-selling. Precision analysis and ROI / ROR e-business and conversion rate allow you to get sales statistics, demand, and more instantly. Emphasizes the relevance of commercial content that is achieved directly through the personal preferences of site visitors, the collection and analysis of users' behavioural and transactional data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 4</head><p>Types of targeting Name Definition Selection of advertising playgrounds</p><p>The most popular targeting type. It is done by selecting the advertising sites so that their visitors match the target audience.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Thematic targeting</head><p>Show content ads on websites that are relevant to the content.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Orientation by interests</head><p>Display advertising (contextual advertising) by the interests of visitors to the site.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Geo-targeting (geo-targeting)</head><p>Shows ads to a target audience that is restricted to a specific geographic region selected by the advertiser. Orientation by Showtime It allows you to limit your ad delivery by the time of day (morning/evening, weekdays/weekends), weeks, and years.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Sociodemographic targeting</head><p>Display ads that focus on a specific class of target audience: split ads by the target audience by age, gender, revenue, position, etc.</p><p>Quantity limit impressions to one to the user It allows you to adjust the number of impressions of the advertising medium to one unique user as he interacts with the advertising platform. Most commonly used in banner ads with pay per 1000 impressions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Behavioural targeting</head><p>The most promising direction to date is to introduce a mechanism for collecting user actions on the Internet through cookies.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Geodinky targeting</head><p>AlterGeo first mentioned the concept. The bottom line is that knowing about the object's movement (the exact location up to the institution where the thing is located can determine modern geo-social services. For example, AlterGeo.ru). It stops at some points, and you can represent the habits and passions of the object. For instance, if a thing goes to a beerhouse, the beer is probably interested. Psychoangry targeting Also, one of the most promising areas is based on information on psychological qualities (psycho-type, society), various advertising is published. Theoretical background -Socionics.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>MSB (Matrix Shop</head><p>Behaviors)</p><p>The newest technology, the essence of which is: For each customer, based on the specifics of communication of their managers with clients, a behavioural matrix is created, which contains not only stereotypical models of thinking of customers in this business model, but also weighting coefficients of their importance in percentage. This detail allows you to evaluate the site's quality (structure, usability, design, the text content), not at the level of good/bad, but the group of specific figures.</p><p>Staying in touch with users is effective thanks to the automatic tracking of statistics, which uses ROI/ROR rates and Web resources conversion to analyse. The modification or performance of Web resource visit is the ratio of the number of information resource visitors who completed the targeted activity to the total number of Web site visitors <ref type="bibr" target="#b2">[3]</ref>. It is hidden/direct instructions from sellers, advertisers, and content creators, i.e. subscribe, purchase, sign up, visit of a particular Web resource page, and navigate to an advertising link (Table <ref type="table">5</ref>) <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 2: Main directions of Internet representation</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 5</head><p>The online marketing advantages, developed by <ref type="bibr">[1, 3 -4]</ref> Name Definition Interactivity (Interaction )</p><p>The principle of organizing a system where the goal is achieved by exchanging content between the environment and system elements Search Engine Marketing</p><p>The increasing search engine traffic, generating search results lists and advertisements (Table <ref type="table">6</ref>) Targeted advertising An advertising mechanism allows you to allocate an information resource from the entire audience to a target resource that meets the set criteria for its advertising Post-click analysis A post-click marketing method that maximizes the performance and conversion of your information resource and Internet ROI Usability user is total fertility convenience when using the object. The user interfaces development of e is focused on the maximum visual/psychological comfort; coefficient of efficiency of execution of menu design and system of navigation on the information resource; convenience and ease of use, userfriendliness, and practicality of the user interface.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 6</head><p>Search engine-marketing (SEM) technology developed by <ref type="bibr" target="#b0">[1]</ref> Technology Usabilityuser is a general convenience factor when using object; the user interfaces development focused on the maximum visual/psychological convenience; menu design performance and site navigation; convenience and ease of use, user-friendliness, and practicality of the software interface. Search engine marketing does not reach advertising goals due to the following factors <ref type="bibr" target="#b2">[3]</ref>: they do not always directly report the advertised product; do not continuously pursue the purpose of selling the product/service; with their help, it is challenging to increase brand recognition; it is impossible to market a new service /product/content.</p><p>Using SEM result is <ref type="bibr" target="#b2">[3]</ref>: 1. Attracting users to an information resource where the audience differs on a case-by-case basis, therefore attracting a broad (increasing attendance rate of the Web resource) or an interested audience; 2. Content dissemination about Web resources in SEO. The criterion of a successful SEM strategy is the number of visitors to the Web resource and the quality of the resulting audience. A simple measure for checking the popularity of Web resource is the dynamics of the number of external links to the Web resource and the increase in references to the name of a service/product/content or company trademark. The marginal case of SEO and contextual advertising is the placement of advertisements in the content search results of the Web resource. The development of the Internet has fostered new search engine marketing technologies for social networks (Video Marketing Marketing). The separation of search engine marketing into a separate standalone strategy is associated with <ref type="bibr" target="#b0">[1]</ref>:</p><p> The continued growth of the Internet market;  The growth of the contextual / search advertising market;  Using SEO technology <ref type="bibr" target="#b0">[1]</ref>;  The need for optimal surfing/navigation in content;  Supporting the complex content lifecycle process it goes through while managing the various stages of publishing.</p><p>The process of designing and creating an electronic content commerce systems (ECCS) based on the results of online marketing is iterative and proceeds from analysis, design, plan development to prototype creation and experimental testing, starting with the specification, layout, template creation, content formation, and content according to the structure of the information resource (Fig. <ref type="figure">4</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 4: Internet marketing for e-commerce content systems</head><p>Concentrate on end-user business goals and needs. In the initial stages, users are connected to the definition/development of functional requirements using survey letters, design alternatives, and prototypes of varying degrees of readiness. They collect valuable information, giving users a sense of direct involvement in the design process and gaining their trust.</p><p>A well-known method of analysing textual information is that content analysis is a standard research method in the social sciences (Fig. <ref type="figure">42</ref>, Table <ref type="table" target="#tab_1">7-9</ref>). The subject is the analysis of the content of text arrays and communicative correspondence (comments, forums, electronic mail, articles, etc.). The concept of content analysis is not uniquely defined <ref type="bibr" target="#b3">[4]</ref>, so systems built on different approaches are incompatible. Applying the content analysis to e-commerce content systems offers several benefits for simplifying your business and resolves some problems facing business process participants, namely:</p><p>1. Filtering user content on an information resource; 2. The ability to automatically create a portrait of a regular user based on the analysis of his comments; 3. The ability to automatically create a "portrait" of the target audience based on the analysis of "portraits" of regular users; 4. Reducing the number of moderators of the information resource in the ECS; 5. Reducing the time for posting user content on an information resource due to its automatic processing, not by moderators; 6. Elimination of the language barrier due to the automatic formation of dictionaries of regular users and automatic translation. The qualitative and quantitative method of document research (characterized by the objectivity of conclusions and rigour of the procedure) and quantitative processing of the text further interprets the results. The subject of the study -the problems of social reality, which are expressed and hidden in the documents, and the internal laws of the object of study B. Krasnov It consists of searching in the text definite meaningful concepts (units of analysis), identifying the frequency of their appearance and correlation with the content of the whole document E. Tarshish</p><p>Research technique for obtaining results by analysing the content of the text about the state and properties of social reality</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 8</head><p>The main components of content analytic research Name Properties of the main components of content analytic research Observation Elaboration of the mass of texts, using the typical sociological procedures of continuous/selective observation, with the observance of representativeness requirements Structuring</p><p>The assumption of structuring, segmentation, dismemberment of texts or the separation of meaningful invariants (repetition in all / several texts) in the studied mass population Formalization They ensure the uniformity of segmentation and isolation of invariants, application of a high degree of formalization, strict operating rules and formal algorithms in analytical procedures Abstracting Formalized separation of whole texts or selection of individual elements for subsequent collection using the analytical and synthetic procedures Analysis Use of probability theory and mathematical statistics methods for text processing.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 9</head><p>Types of content analysis methods Name Quantitative (meaningful) Quality (structural) Definition A study of words, topics, and messages that focuses on content.</p><p>A study that examines not its content but its form and structure Example As a first step, the researcher should create a dictionary in which each observation will identified and assigned to the appropriate category.</p><p>Determining the period or amount of print space that is assigned to a topic in a given source, or how many words or columns are allocated to each topic in the appropriate category. Feature Before analysing the selected linguistic units, predict their content (create a dictionary) and determine each possible observation result by the researcher's expectations.</p><p>The specific weights of P each topic and category are calculated (</p><formula xml:id="formula_0">R P T </formula><p>, where R is the number of units of this category, T is the total number of units) and a comparative analysis of the relevant topics is carried out to further predict events, processes.</p><p>Most definitions of content analysis are constructive, that is, procedural (Table <ref type="table" target="#tab_1">7</ref>). Due to different initial approaches, they generate different algorithms, which are sometimes contradictory <ref type="bibr" target="#b0">[1]</ref>. The most questionable is the neglect of the role of context (Table <ref type="table">8</ref>). The practical importance of the method avoids many contradictions. Rev ' union means, and methods of natural selection and repeated evaluation of the results obtained provide the opportunity to release or confirm factual knowledge and power/utility toolkit (tab. 9). Content analysis is a quantitative and qualitative analysis of text arrays for further meaningful interpretation of the obtained quantitative and qualitative patterns. The method is to create from a variety of text an abstract model of content. It is used to analyse sources invariant by structure/content in the form of unsystematic, disorderly organized text <ref type="bibr" target="#b0">[1]</ref>.</p><p>The content analysis of commercial text content is used to determine the tone of the text, duplicate content, and spam and identify new events to identify thematic plots of text content.</p><p>Content analysis is used to study sources invariant in structure/content and existing as non-systematic, disorderly organized textual material <ref type="bibr" target="#b5">[6]</ref>. The method of content analysis is to form from a variety of text material abstract models of the text's content. There are two methods of content analysis: quantitative and qualitative. In a study of the mechanisms of generating textual information, it is found in <ref type="bibr" target="#b5">[6]</ref> that the choice of a text description model depends on constructing a probabilistic linguistic test and organizing the selection from the text of its units. Probabilistic modelling of textual information and its components is an introductory, preparatory stage for describing the functions of linguistic units in the text. The study of language and speech functioning through probabilistic modelling of content relies on quantitative linguistics, probability theory, mathematical statistics, information theory, and combinatorics. In linguistic studies, especially during the implementation of content search algorithms <ref type="bibr" target="#b5">[6]</ref>, there are constant problems associated with predicting the occurrence of a certain number of word-forms/phrases in specific classes in a segment. Probabilistic modelling of text and syllables, word combinations, grammatical categories allows determining the sample required to provide the corresponding linguistic unit <ref type="bibr" target="#b5">[6]</ref>. Quantitative evaluations of content information in text, words, and phrases (Fig. <ref type="figure" target="#fig_2">5, a</ref>) are obtained based on the meaning of syntactic information and using the idea of contextual conditioning <ref type="bibr" target="#b5">[6]</ref>. During the experiment of guessing letters of unknown text in work <ref type="bibr" target="#b5">[6]</ref>, it was noticed that the participants of the investigation make their hypotheses about the most probable continuation of the text, based on two types of combinatorial constraints: combinatorics of figures (letters and syllables) and combinatorics of signs (morphemes, words, words ). The experiment shows that even at the fourth or fifth letter steps, the combinatorics of letters and syllables are suppressed by the constraints related to the compatibility of morphemes and words. As the text is expanded, word combinations are compounded with word combinations and sentences, and restrictions associated with the combinatorics of paragraphs, chapters, book sections, or articles appear. Thus, when guessing letters located at a sufficient distance from the beginning of the text, the experiment participant relies not on the statistical combinatorics of letters and syllables but on the text's meaningful (lexical-grammatical) construction. Suppose the content removed from the original text section acts as a quantitative assessment of the distribution (distribution) and letter statistics. In that case, the syntactic information obtained from the outer areas of the text serves as a reflection of meaningful (semantic-pragmatic) information. These considerations make it possible to propose a content analysis method for quantifying meaningful information in text and its segments. In identifying new events, stream content consistently to the input ECCS using scanning or content router and thematically selected results (Fig. <ref type="figure" target="#fig_2">5, b</ref>) identify new developments in the content description <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b7">8]</ref>. For them, they form story chains of similar content <ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref>. Content that reflects new events is the basis of interdependent content clusters (Table <ref type="table" target="#tab_0">10</ref>) <ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref>. Each set can be the basis for the formation of a complete story chain.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 10</head><p>Processes for detecting new events <ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref> Author Stages of discovering new events G. <ref type="bibr">Salton</ref> 1. The first content under review is the first cluster. Each cluster is represented by a vector of terms (keywords) included in the content of that cluster. The term vector, normalized in some way, is a centroid. Sometimes centroid is content that is closest in some measure to the term vector of a given cluster, which does not change the essence of this algorithm <ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref>. 2. Each subsequent content is compared to the centroids of the existing clusters (some degree of closeness is introduced). 3. If the content is closed enough for some cluster, it is attributed to that cluster, after which the corresponding centroid is enumerated. 4. If the content is not close to the existing clusters, then a new set is formed to which such content is attributed. 5. The time range of the content under consideration is commonly referred to as the "observation window". Clusters whose entire content is outside the observation window are taken out of the scope of review. The algorithm, as a result, every new cluster that arises corresponds to a new event reflected in the content of that cluster. R. Papka 1. Requests for general topics are formed (using Text Mining techniques -identifying and selecting concepts from content) <ref type="bibr" target="#b12">[13]</ref>. 2. New incoming content is compared to existing requests. 3. If the content does not respond, it is associated with a new event. 4. A new request corresponding to such content is included in the system (optional).</p><p>Determining the content tone based on text analysis is more complex than detecting spam. When seeing spam, consider two hypotheses (spam, not spam) and select the vibrant colour style (positive, negative, neutral) and their combinations. The Bayesian method uses spam databases to determine spam, two content corpses, one of which is made up of spam and the other is not <ref type="bibr" target="#b7">[8]</ref>. For each content, the frequency of use of each word and the weight rating (0 to 1) are calculated, that is, the conditional probability that the content with that word is spam <ref type="bibr" target="#b8">[9]</ref>. Weight values close to ½ are not considered in the integrated calculation, so talks with such weights are ignored and deleted. The hypothesis space contains the H from the set with a positive tone, choose the terms specific to this content. They choose words t with a probability calculated by Bayes formula and greater than ½. Decisions about the content tonality are made considering the difference between the values of the weighted estimates of the hypotheses 1 H and 1 H  [9]. According to the Paul Graham method, if the content n contains terms with the weighted forecast 1 ,..., n ww , then the conditional probability of spam occurrence [9-12] is based on the data from the evaluation bodies and is calculated as</p><formula xml:id="formula_1">    / 1 i i i Spm w w w       .</formula><p>If S is an event that is that list is spam, A is an event that a letter has contains the word t. According to Bayes' formula <ref type="bibr" target="#b8">[9]</ref>.</p><formula xml:id="formula_2">              | | | |</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>P A S P S P S A P A S P S P A S P S  </head><p>.</p><p>To detect such content i c and duplicate j c , the rule of reflectivity is valid, but the condition of transitivity is not fulfilled ,</p><formula xml:id="formula_3">i j j k c c c c  ik cc .</formula><p>The content is similar to the text in the mix that includes it, but the combination is not like it. Alternatively, content identical to the other two is compiled, but the originals are significantly different. For the duplication relation, symmetry and transitivity are performed, that is, i In the analysis of similarity criteria, the conditions of symmetry ,:</p><formula xml:id="formula_4">j j i c c c c    and , i j j k i k c c c c c c     .</formula><formula xml:id="formula_5">ij ji i j a a </formula><p> and transitivity are used , , :</p><formula xml:id="formula_6">1, 1 1 ij jk ik i j k a a a     </formula><p>, changing the volume of comparison terms to find the corresponding coefficients <ref type="bibr" target="#b109">[110]</ref><ref type="bibr" target="#b110">[111]</ref>, i.e.</p><formula xml:id="formula_7">0                             N i N j ij N i N j ji ij a a a and max                            N i N j ij N i N j N k ik jk ij a a a a ,</formula><p>where N is the amount of content. The asymmetry coefficient is associated with the definition of duplicates approximately and the transitivity level with completeness. When new events are detected from a content stream sequentially fed to an ECCS input from a scanner or content router and selected on a thematic request, recent events are described in the content <ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref>. For them, they form story chains of similar content. Content that reflects new possibilities is the basis of interdependent content clusters <ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref>. The collection becomes the basis for the formation of the story chain</p><formula xml:id="formula_8">  1 , , t i u sim c Dictionary      2 2</formula><p>, ,</p><formula xml:id="formula_9">n t i j u sim c Dictionary      where n is the volume of content flow; 1 c is current content; n c is the latest content; i c is i the content; Dictionary is the dictionary;   , ij sim c c is a measure of the content's proximity i to j;   , i sim c</formula><p>Dictionary is a measure of the closeness of the content to the dictionary,  and  are empirically determined parameters [9]. If the content is a plurality of terms</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>   </head><p>: The proximity measure is given</p><formula xml:id="formula_10">i ik i c w w w c    , then   : | i j i j c c w w c w c     it</formula><formula xml:id="formula_11">  1 , N i j ik jk k sim c c e e N          .</formula><p>In <ref type="bibr" target="#b8">[9]</ref>, the proximity apparatus uses a conditional probability apparatus (the entry of some term w into the content i c , provided that it is included in the content j c ). To develop ECCS, a Web Content management system, CMS <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref>, if it meets a specific set of requirements (Fig. <ref type="figure">6</ref>). CMSs do not support the entire life cycle of the content stream and do not solve the main problems of information resource development is content creation and maintenance <ref type="bibr" target="#b3">[4]</ref>. The main disadvantage of CMS is the lack of communication between the input information, the content and the output information (Fig. <ref type="figure">7</ref>) <ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref>.</p><p>Usually, such systems are used to store and publish a large amount of content (documents, images, music, videos, etc.). Such CMSs allow you to manage text and graphics content by providing users with convenient tools for storing and publishing information. CMS is a tool (Table <ref type="table" target="#tab_3">11</ref>) for modelling the branched structures of information resources in the SEC and managing their content <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref> without special technical skills such as programming or HTML layout. CMS is developed to generate content using dynamic collection and content caching, so its safety <ref type="bibr" target="#b1">[2]</ref>. CMS provides control over access to the information resource and changes and aims to simplify managing the information resource while maintaining the flexibility of settings and management. The main components of the information resource in CMS are presented in Table 12 <ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref>.  Using CMS does not require software installation. They use a browser for editing and administration. The intuitive interface and ease of use of the system make it easier to manage the information resource and reduce its cost. <ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref>. CMS includes the following features: rapid updating and retrieval of content in an information resource; collecting customer and lead data; forming and editing polls; analysis of information resource visit. There are large streams and volumes of different content in ECCS. Most of these streams of content drawn from easily formalized and automated procedures and commercial content. However, there is no overall approach to formalizing, designing, developing and implementing the ECS. Such systems do not describe or disclose the relationships and dependencies between input data, commercial content, output data and processes of processing information resources (Table <ref type="table" target="#tab_0">12</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 12</head><p>The main components of the subsystem of processing of information resources, developed by <ref type="bibr">[</ref> The value of the content determines its attractiveness to the consumer. Integrating content makes an attractive resource and the integration of applications -useful <ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref>. Using CMS does not require software installation. They use a browser for editing and administration. The intuitive interface and ease of use of the system make it easier to manage the information resource and reduce the further costs of maintaining it. <ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref>. CMS includes the following features: rapid updating and retrieval of content in an information resource; collecting customer and lead data; forming and editing polls; analysis of information resource visit.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Materials and methods</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Content management tools in e-commerce</head><p>Several content lifecycle models (Tables <ref type="table" target="#tab_5">13-14</ref>) are proposed and described by several authors with properties supported set by different technologies and processes <ref type="bibr" target="#b18">[19]</ref><ref type="bibr" target="#b19">[20]</ref><ref type="bibr" target="#b20">[21]</ref><ref type="bibr" target="#b21">[22]</ref><ref type="bibr" target="#b22">[23]</ref><ref type="bibr" target="#b23">[24]</ref><ref type="bibr" target="#b24">[25]</ref><ref type="bibr" target="#b25">[26]</ref><ref type="bibr" target="#b26">[27]</ref><ref type="bibr" target="#b27">[28]</ref><ref type="bibr" target="#b28">[29]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 13</head><p>Define the term content <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref> Appointment Define the term content Algebra For example, the common determinant of the coefficients is the value among the plurality of data (the largest, smallest, average computation time of a function).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Measurement theory</head><p>An additive function that determines the value of a field (variable)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Web content The information published on the Internet Media content</head><p>The published information by users, designers, or administrators of Web portals, such as audio/video/graphics.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Quantitative determinant</head><p>Volume, sphere, space, size Applied Linguistics System of definitions or semantics of language; subject matter/question formed in the form of a book or document; part of the language being examined, for example, content in a sentence -noun or verb; the information conveyed in a conversation and easily perceived after reading and analysing.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Formatted content</head><p>Encoded format for displaying melons, such as password hash or private/public key for network communication.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Free content</head><p>Published material that is legally protected by copyright through free licenses.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Open content</head><p>Published material free use based on creating material for publications Mathematical Linguistics</p><p>An object that contains contextual information (explaining an area or its meaning, explaining the difference between objects) Content table</p><p>The content of the document, for example, the contents of a scientific book or administrative document Information Technology</p><p>The object of an information resource of predefined form; text content on the Website Knowledge, content and map information are suitable for three key processes: creation, editing, publishing. Creation is an approximate definition of knowledge for a particular idea or set of ideas. Editing is the process of modifying professional content with these ideas in mind. The publication is the submission of content to the right person at the appropriate time. The creating, editing and publishing processes are required to generate content benefits. Thus, the benefits of content are described by the formula:</p><p>. ContentBenefit Create Edit Publish   </p><p>[22] JoAnn Hackos creation, archiving, drafting/ combination, publication</p><p>The module covers the concept of metadata. She is deeply immersed in terms of metadata and how it should be used.</p><p>Focuses is on data legalization, database searching, and information transformation into knowledge. The author gives an idea of the correspondence of information accumulation to a solid and stable information model. She describes a merger of usability ideas, information architecture, and content management in the model to focus on end-users <ref type="bibr" target="#b19">[20]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Ann Rockley creation, revision, management, delivery</head><p>The creation phase consists of planning, designing, authorization, and verification. A unified content strategy is a systematic method of identifying all the major content requirements to create consistently structured content, reuse, manage recognised content sources, and edit content based on user requirements and needs <ref type="bibr" target="#b25">[26]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Russell Nakano presentation, comparison, updates, mergers, publication</head><p>The author paid particular attention to the process of managing Web content, including collecting versions and simultaneous changes <ref type="bibr" target="#b23">[24]</ref>.</p><p>The This model focuses on content strategies, provides a high-level overview of the benefits, roles, activities, and outcomes associated with strategy content. Model Purpose: Web consulting, design, and industry development describes processes and methodologies applied to all types of content: text, images, video, and audio <ref type="bibr" target="#b20">[21]</ref>.</p><p>In some content lifecycle models (Table <ref type="table" target="#tab_7">15</ref>), project management concepts, information management, information architecture, content strategies, Web site management, and semantic printing are provided <ref type="bibr" target="#b29">[30]</ref><ref type="bibr" target="#b30">[31]</ref><ref type="bibr" target="#b31">[32]</ref><ref type="bibr" target="#b32">[33]</ref><ref type="bibr" target="#b33">[34]</ref><ref type="bibr" target="#b34">[35]</ref><ref type="bibr" target="#b35">[36]</ref><ref type="bibr" target="#b36">[37]</ref><ref type="bibr" target="#b37">[38]</ref>. Different authors suggest different stages of the content lifecycle <ref type="bibr" target="#b48">[49]</ref><ref type="bibr" target="#b49">[50]</ref><ref type="bibr" target="#b50">[51]</ref><ref type="bibr" target="#b51">[52]</ref><ref type="bibr" target="#b52">[53]</ref><ref type="bibr" target="#b53">[54]</ref>. The main steps (content creation, development, viewing, distribution and archiving) are present in almost all proposed models <ref type="bibr" target="#b54">[55]</ref><ref type="bibr" target="#b55">[56]</ref><ref type="bibr" target="#b56">[57]</ref><ref type="bibr" target="#b57">[58]</ref><ref type="bibr" target="#b58">[59]</ref><ref type="bibr" target="#b59">[60]</ref><ref type="bibr" target="#b60">[61]</ref><ref type="bibr" target="#b61">[62]</ref><ref type="bibr" target="#b62">[63]</ref><ref type="bibr" target="#b63">[64]</ref>. The lifecycle of processes, actions, content status, and content management role differ in models depending on organizational strategies, needs, requirements, and capabilities <ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref><ref type="bibr" target="#b19">[20]</ref><ref type="bibr" target="#b20">[21]</ref><ref type="bibr" target="#b21">[22]</ref><ref type="bibr" target="#b22">[23]</ref><ref type="bibr" target="#b23">[24]</ref><ref type="bibr" target="#b24">[25]</ref><ref type="bibr" target="#b25">[26]</ref><ref type="bibr" target="#b26">[27]</ref><ref type="bibr" target="#b27">[28]</ref><ref type="bibr" target="#b28">[29]</ref>. Web Content Lifecycle Models 1-7 do not solve the problems of content creation and implementation, and they do not solve all of the issues of managing a convention, for example:</p><p> Submitting a plurality of content to an end-user according to their request, history or data portfolio;  Generation of digests and user or content portraits;  Automatic discovery of thematic subjects;  Construction of tables of the interrelation of concepts;  Calculation of ratings of terms;  Collection of information from different sources and its formatting;  Identification of keywords and concepts of content;  Content categorization, identification of duplicate content, selectively distributing content. Models 8-10 successfully cope with content management issues and some content generation issues but ignore content implementation issues. Models 11-12 solve content generation and content management issues and partially address content implementation issues. Not all of these models support Web 2.0-3.0 (Table <ref type="table" target="#tab_8">16</ref>) <ref type="bibr" target="#b65">[66]</ref><ref type="bibr" target="#b66">[67]</ref><ref type="bibr" target="#b67">[68]</ref><ref type="bibr" target="#b68">[69]</ref><ref type="bibr" target="#b69">[70]</ref><ref type="bibr" target="#b70">[71]</ref><ref type="bibr" target="#b71">[72]</ref><ref type="bibr" target="#b72">[73]</ref><ref type="bibr" target="#b73">[74]</ref><ref type="bibr" target="#b74">[75]</ref>. Database replenishment -having one becomes immediately accessible to everyone; the data is organized in a volatile manner; data usage tools -APIs; automatic two-way links submission form -blogs; dynamic site; the address has a trace element of content; the source is the collective mind; an interface for handling data across the network; "Free" GNU FDL license; content is not required to visit the site -read RSS feeds.</p><p>Network as a single collective mind, content atomization, aggregation, syndication.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Events</head><p>Software ordering and manufacturing; publication of the content by the authors and their readers' perception; appeal to a third party -a mediator to use its resources; big, not many deals.</p><p>Collaboration through the Software Support Department; interacting, adding properties, values, creating shared content with each participant; self-service based on the partner architecture of the service, which is merely an intermediary between users using their resources; small many numerous transactions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Cooperation; amateur; single mass relationships</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Value/ cost</head><p>Value in the software -the software owner makes money; The Internet is valuable as a source of information.</p><p>Value in the database -the database owner and services to work with them make money; The Internet is valuable as a communication tool.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Working with the database; service, not product; saving time and attention</head><p>A well-known content management tool is the Content Management System (CMS), software for organizing Websites or other Web resources or individual computer networks <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref>. CMS must meet certain requirements set (Fig. <ref type="figure" target="#fig_6">8</ref>). Usually, such systems are used to store and publish a large amount of content (documents, images, music, videos, etc.) <ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref>. Such CMSs allow you to manage text and graphics content by providing users with convenient tools for storing and publishing information. In Fig. <ref type="figure" target="#fig_6">8</ref>, b is a CMS classification <ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref>. CMSs do not support the entire content lifecycle and do not solve the main problems of Web resource development -content generation and implementation. The main drawback of CMS is that there is no link between the input, content, and output. CMS is often used for the construction of SEC and ECCS (Table <ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref><ref type="bibr" target="#b19">[20]</ref>, such as online newspapers (Fig. <ref type="figure" target="#fig_7">9</ref>, a) <ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref>. Web Content management system, WCMS developed to generate content within portals with the same problems (dynamic collection, caching content, security, etc.) and other Web applications <ref type="bibr" target="#b75">[76]</ref><ref type="bibr" target="#b76">[77]</ref><ref type="bibr" target="#b77">[78]</ref><ref type="bibr" target="#b78">[79]</ref><ref type="bibr" target="#b79">[80]</ref><ref type="bibr" target="#b80">[81]</ref><ref type="bibr" target="#b81">[82]</ref><ref type="bibr" target="#b82">[83]</ref>. The value of the content determines its attractiveness to the consumer <ref type="bibr" target="#b83">[84]</ref><ref type="bibr" target="#b84">[85]</ref><ref type="bibr" target="#b85">[86]</ref><ref type="bibr" target="#b86">[87]</ref><ref type="bibr" target="#b87">[88]</ref><ref type="bibr" target="#b88">[89]</ref><ref type="bibr" target="#b89">[90]</ref><ref type="bibr" target="#b90">[91]</ref><ref type="bibr" target="#b91">[92]</ref><ref type="bibr" target="#b92">[93]</ref><ref type="bibr" target="#b93">[94]</ref><ref type="bibr" target="#b94">[95]</ref><ref type="bibr" target="#b95">[96]</ref><ref type="bibr" target="#b96">[97]</ref><ref type="bibr" target="#b97">[98]</ref><ref type="bibr" target="#b98">[99]</ref>. Content integration makes portals attractive and application helpful integration. As users are increasingly drawn to portal applications, there are more and more applications, including ECM. The WCMS admin panel allows you to change/add new information for different language versions of the Web site <ref type="bibr" target="#b99">[100]</ref><ref type="bibr" target="#b100">[101]</ref><ref type="bibr" target="#b101">[102]</ref><ref type="bibr" target="#b102">[103]</ref><ref type="bibr" target="#b103">[104]</ref><ref type="bibr" target="#b104">[105]</ref><ref type="bibr" target="#b105">[106]</ref><ref type="bibr" target="#b106">[107]</ref><ref type="bibr" target="#b107">[108]</ref><ref type="bibr" target="#b108">[109]</ref><ref type="bibr" target="#b109">[110]</ref><ref type="bibr" target="#b110">[111]</ref><ref type="bibr" target="#b111">[112]</ref>. Changes to the site are displayed immediately after making and saving.   Significantly affects the level of subscription of goods.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 18</head><p>Classification of Internet newspapers by type of articles created <ref type="bibr" target="#b112">[113]</ref><ref type="bibr" target="#b113">[114]</ref><ref type="bibr" target="#b114">[115]</ref><ref type="bibr" target="#b115">[116]</ref><ref type="bibr" target="#b116">[117]</ref><ref type="bibr" target="#b117">[118]</ref><ref type="bibr" target="#b118">[119]</ref> Articles Characteristic Actually generated Own journalists describe events, interview participants of events. Moderated Journalists/moderators independently search for material on the Internet, analyse and organize the material received, write based on this material of the article.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Legalized</head><p>Material for future articles looks for a module of the system by links or subscriptions, moderators analyse and organize the material received, write based on this material of the article.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Combined</head><p>A combination of the first three types Filtered Material for future articles searches for the module of the system by links or subscriptions and filters according to the dictionaries contained in the module, and moderators analyse and organize the material received, write based on this material of the article.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Aimed at user</head><p>Filtered, but the formation of the article considers the level of user experience, formed pieces primarily for users with more experience. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Barton-Kebler</head><p>,, C A B T   . Internet space is divided into stable and dynamic components with different characters and joints regarding content flow management integration. The regular Internet component contains "Long-lasting" content, and the active ingredient has constantly updated resources. Some of this component then flows into the stable, the other part and to disappear or fall into the hidden Web-segment space is not available for additional users of my public information retrieval systems. The most dynamic segment of the content is news, which is also the highest level of upgrades, and it generated and distributed large amounts of data. Therefore, it is the best object of research. The processes of content ageing, the loss of its relevance, are described by an equation of two components   , where   mt is part of the helpful information in the total flow over time T , the first denial corresponds to the stem and flax resources, and the second -dynamic (news).</p><p>Content dynamics in the network is conditioned with many factors that cannot be accurately analysed. Within modelling, a reasonable assumption is the general nature of the temporal dependence of the number of thematic publications determined by simple laws. For more adequately support should refer to the complex of about actually.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Classic space-vector</head><formula xml:id="formula_12">, C</formula><p>TF IDF   . The model described by the equation</p><formula xml:id="formula_13">* C TF IDF </formula><p>where TF is the local frequency Terms (Term Frequency, level of significance of terms within the content), and IDF is the reciprocal frequency of the message throughout the stream of content that E s tit this term (Inverse Document Frequency, level of uniqueness Term throughout the content stream). The product of these values -a criterion for determining the significance of what was the (weight). Content (messages, news) is ageing, losing its relevance with an intensity determined by some empirical law. For illustration, let's assume that it's exponential law. One of the suggested approaches to that pare of generalization, such as message ranking, is the use of dependent parametric factors. For example, it is determined the weight of the message as the product multiplication ** t TF IDF e   . Value  is some constant, t is the length of time that has elapsed since the notification in the stream of content. Value  is a factor n and the half-life relevance of content. If the expected use exponential model is</p><formula xml:id="formula_14">12 t e   </formula><p>determined with expert route by which the message through ageing loses its significance in half. Accounting for content ageing (loss of some relevance) is of great importance in analytical studies, the creation of information products (information portraits), the central storylines of events, and the ranking of information retrieval systems. An approximate estimation of the rate of content ageing is of practical value in determining the set of topical content. </p><formula xml:id="formula_15">      00 y t y t v t t   </formula><p>where   yt is some notes at a time t , v is the average speed of increase/decrease of content intensively in time (e.g., due to ageing). Content component content quantitatively assessed as fluctuation (deviation from but he mi) stream content. It is change the default critically departed</p><formula xml:id="formula_16">            2 00 0 1 . i i k i k t y t y t v t t i        With change   t </formula><p>process of changing the subject content is a process independent of magnification (do not include links to the previous content).In case of standard deviation by time such as   tt    , the bigger  (degree of connection between random events 1 ;1 2   ) the higher is the correlation between the current and previous content. , where  is the average relative change in the intensity of the content stream. With a shift in power at a specific time</p><formula xml:id="formula_17">          11 / i i i i t N t N t N t   </formula><p>. Change the value fluctuations   </p><formula xml:id="formula_18">    1 // w n n v n n K   </formula><p>where n is the total number of words stream K is the number of unique words. It isn't peculiar in terms of interpretation of the results. It grows monotonically and does not describe the processes that must have local extremes by their nature.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Spatiallyvector</head><p>Defining a meaningful term across the entire content stream. Ability to identify the most up-to-date content from the many available ones Mandatory ' these patterns ranking content using pairs of parametrical multipliers that depend on the time Linear Determining the intensity of a thematic content stream over time (e.g., as a result of ageing)</p><p>They are applied with linear dynamics control of thematic content.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Exponential</head><p>Describes the ageing process of content, the loss of its relevance.</p><p>There is no correlation between unique content and content. Logistic It combines the relative simplicity of problem formulation with the ability to vary the solution using a set of parameters with more or less transparent physical content.</p><p>Study the dynamics of only a single thematic flow. The dimensionality of the parameters and their measurement is not taken into account.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Analytical</head><p>Describes the ageing process of content, the loss of its relevance.</p><p>Mandatory ' compulsory presence dictionary of keywords Using a CMS does not require installing special software in the workplace. They use a regular browser (Google Chrome, Internet Explorer or Opera) for editing and administration. The intuitive interface and ease of use of the system make it easier to manage the site and reduce further costs of maintaining the Web resource. To work with the design, you need only have basic Internet skills. The most popular CMS is Drupal and Joomla! When considering the content item dynamics at current content in the county limited models (Table <ref type="table" target="#tab_10">19</ref>-20) that paves the way for further research <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref>. Content management models are designed to determine the ageing/relevance of content flow. They do not solve the problems of content creation, implementation, and they do not solve all content management problems:</p><p> Submission of a plurality of content to the end-user according to his / her request, history or portfolio;  Formation of digests; automatic information portraits;  Automatic detection of thematic subjects;  Automatic construction of tables of the interrelation of concepts;  Calculation of concept ratings;  Automatic collection of information from various sources;  Automatic formatting of information;  Automatic detection of keywords;  Automatic content categorization;  Duplicate detection and selective dissemination of content;  Attract potential users. Fig. <ref type="figure" target="#fig_6">8</ref> is a graphical diagram of a typical regional information resource developed by CMS Joomla! Apply method and online marketing for the analysis of Web resources in the region. Fig. <ref type="figure" target="#fig_12">10</ref> shows IDF0 diagram of a typical regional information resource. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">The most effective methods of attracting potential customers</head><p>Forms on the information resources of some advertiser-friendly are due to both. They have the right to send their contact details and additional information about the products/services of the advertiser. Persons who have provided information through such forms on an advertiser's information resource are potential customers. Analysing this data and using it effectively helps build a profile for your possible audience. To do this, you must use the following methods.</p><p>1. Optimize your AdWords campaigns. After clicking on the ad, visitors expect to take some action on the landing page. The visitor must have the right idea of what he can expect before clicking on an advertisement. For this optimization campaign AdWords, will establish rates for the required keywords if necessary using negative keywords (search terms reports analysis), uses UT accurate yet descriptive and engaging ad text and set up conversion tracking. Tracking the landing page bounce rate and conversion rate and comparing them to different variations of ad text that drives traffic to the page can help you determine how well your ad was performing (Fig. <ref type="figure" target="#fig_17">11</ref>).</p><p>Figure <ref type="figure" target="#fig_17">11</ref>: IDF0 diagram of a typical regional information resource 2. Landing page optimization. When a visitor lands on a landing page, their expectations must be met or exceeded. Goal pages will upload fast; transitions between them should be convenient and satisfy you with Google's landing page. To expand the client base with the use of forms, landing pages have to be done very simply and understandable. Visitors landing page may feel uncomfortable providing their information if they think the site is trustworthy. Reducing the amount of information a visitor needs to enter and solely requesting the information they need to continue communicating with the visitor will increase the likelihood of completing the form. If a visitor starts filling in your paper but then decides to leave before submitting (such as the form is too long), the program Web -analysts register it as a rejection.</p><p>3. Involvement of interested clients. Not every potential customer who fills in the form will become a real customer. There may be several reasons: the landing page is not clear; the record does not confirm the information provided; a unique program that scans sites and distributes spam and more automatically fills the form. Google cannot control user behaviour on the site. In addition to optimizing your AdWords campaign and landing page, there are several other ways to prevent bogus customers from registering on your site.</p><p>1. Add word verification.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Enable auto-tagging in AdWords.</head><p>To URL-address of the target page linked the GCLID parameter for defined spare revision of the page because of clicking on an ad.</p><p>3. Registration of applications. Each time a visitor submits a form, you can log their IP address, GCLID parameter (if available), referrer URL, and user agent. Based on this data, you can determine if there is traffic from ad clicks and whether there is suspicious activity. When questionable first asset of art and visitors coming to your site via AdWords can resend to Google GCLID options or the visitor's IP address. Google's Advertising Traffic Quality team will check your account.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">View your Google Analytics data in AdWords reports</head><p>By looking at Google Analytics site engagement statistics along with AdWords performance data, you can find out what users do after they click on your ads and land on a landing page. These statistics submitted the following information.</p><p> % New Sessions is the approximate percentage of first-time user visits.</p><p> Pages / Session is the average number of pages viewed per session.</p><p> Average Session Duration is the average amount of time a user stayed on the site.  Bounce Rate. If a site visitor has viewed only one page or triggered only one event, Analytics counts it as an opt-out. Bounce Rate is the percentage of sessions that are interrupted. This content shows how effective the content is on the content resource and helps you decide on optimising your budget, bids, landing pages, and ad text. For example, by comparing the bounce rate and CTR for the content group (Fig. <ref type="figure" target="#fig_17">12</ref>), you can get an idea of how well the site meets the users' expectations involved in the ads.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 12: IDF0 diagram of Content Search Ads</head><p>For example, in Table <ref type="table" target="#tab_12">21</ref> that the Topic 1 ad group has not only a higher CTR (8%) compared to the similar Topic 2 ad group (6%) but also a higher bounce rate (60%). The means that more than half of the users who visited the site after clicking ads in topic group 1 did not stay there to view the offers or make a purchase in more detail. Even though ad group topic 2 receives fewer clicks, the return on investment in them is higher because users involved in this advertising are more likely to linger on a typical regional information resource (Fig. <ref type="figure" target="#fig_13">13</ref>). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.">Analysis of indicators of refusal to visit the information resource</head><p>Bounce Rate is the percentage of visitors who view only one page when they visit your site. There are reasons number why there may be a high failure rate (Fig. <ref type="figure" target="#fig_17">14</ref>) <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 14: Examples of bounce rates</head><p>For example, visitors may leave the site on the sign-in page because of the site design or usability issues. Alternatively, it may be that only certain pages on the site have a high bounce rate for excellent reasons. Here are some of the problems that can cause a high bounce rate: To understand the difference between an Exit Rate and a Bounce Rate for a specific site page, you should consider these three aspects <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>.</p><p> For all page-views, the exit metric is the percentage of recent views per session.  For all sessions initiated from a page, the bounce rate is the percentage of visits per session.  The bounce rate for the page is calculated based only on the hits that started from that page Consider this last aspect in a simple example. The site has pages A through C. There is only one session per day with the page view below <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>.</p><p>The Content Report for Page A will show you three page views and a bounce rate of 50%. The bounce rate will not be 33% because Thursday's page-view A is not considered in the bounce rate calculation. A speech is a session in which there is only one interaction with the visitor. The bounce rate for a page is only relevant when a session starts from this page. Now let's examine the performance and failure rates for a group of days with one session on the site <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>.</p><p>Below are the calculated percentages of outputs and failures <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>. Output metric: Bounce Rate:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5.">Goal Conversion Rate</head><p>For chosen objective i , where 20 , 1  i , this figure represents the percentage of visits that resulted in a conversion (this goal). Transformation occurs when a visitor reaches a destination. There are three types of plans <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>:</p><p> The destination URL is the page that visitors see immediately after the action is completed. To sign up for an account, thank you for registering or thank you for your purchase page or a receipt page. This goal initiates a conversion when a visitor views the specified page.  Site Time is the time limit you specify for a site moderator. When a visitor spends more or less time on a site than a specific time limit, a conversion is made.  The number of pages viewed per visit allows you to determine the page-view threshold. When a visitor views more or fewer pages than the limit, the conversion is completed. Goals and Funnels is a versatile way to determine the success of an information resource or program based on your goals. The funnel can be used to specify the expected traffic path to reach a goal. The combination of goals and funnels allows you to analyse how effectively a site or program is driving users toward the goal. Each time a user action meets a goal, a conversion is recorded in Google Analytics. If you set a goal value in monetary terms, your conversion data will also contain the corresponding values. Goals with Goal Completions (i.e. Goal Completions Levels) can be viewed in Goal reports. You can also analyse goal completion conversions with other messages, including visitor reports, traffic, Site Search reports, and event reports <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>.</p><p>There are four types of targets to choose. When a visitor completes a selected action, a conversion is triggered and recorded in goal reports. You can choose the type of tracking goal you want from the list when setting up goals in your account <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>.</p><p> Destination URL: The address of a specific placement, such as a web page (or virtual page) or application screen that has been downloaded. Thus, a webpage or screen of a sign-up application can be a destination for an e-commerce campaign to identify potential customers. This goal goes well with the sequences.  Visit Duration: Visits that last for a fixed time or longer. You can use this goal to determine the number of visitors who stay on the page or purchase screen for more than 2 minutes.  Pages / Visits (For Web Pages) Screens / Visits (For Applications): A visitor views a certain number of pages or screens during a session. Uses UT this type of goal when you want to capture visitors who see, for example, less than three pages.  Event: The visitor triggers an action that the moderator defines as an event (such as a social recommendation or an ad click). You must first set up Event Tracking before setting up a Goal of this type. Goals are automatically grouped in sets, but the moderator determines which plans should belong to each location. Uses UT sets to categorize the different types of goals for the site. You can track downloads, signups, and receipt pages in separate goal sets. Goals are set at the profile level (up to 20 in a single profile). Each profile can create four groups with a maximum of five goals. To track more than 20 goals for a website or program, create a new profile for that property <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>.</p><p>When setting goals conversion value of a dollar, each time the goal is reached, that number will be logged. Then, all cases of the registered number will be added and displayed as Goal Cost. Any action taken by a user on a website or program can be carried over in dollars. One way to determine the value of a goal is to calculate how often customers who have reached a goal become customers. If the sales team is addressed by 10% of subscribers to newsletters, and the average transaction amount is 500, then the cost of a subscription to newsletters can be set at 50 (i.e. 10% of 500). Visitors reach their goals when they go to the last sign-up page. However, if only 1% of all subscribers make a purchase, then the cost of the Newsletter subscription can only be assigned a value of five. Although it is unnecessary to set prices when setting goals, they use this option to estimate weight and profit from any visitor interaction with the site. System Google Analytics also uses the Goal Value data to calculate other indicators such as return on investment (ROI) and average. You can use the funnel to specify the expected traffic path to reach your destination. Focusing on the steps of the funnel fixed by the moderator, Analytics tracks the times when visitors come and leave the goal. This WMS to obtain valuable information about the site. For example, you could identify a page in a funnel that captures many exits on the way to a goal, indicating problems with that page. If there are many missed steps, this will display difficult navigation or too many conversion paths with many unnecessary steps. Funnels can only use in conjunction with a destination. The last page in the funnel is a goal page (entered as a goal), while the previous pages form a funnel. If the goal of the funnel is to attract leads, then the first page of the funnel can be assigned the URL of the contact request form, and the landing page is the URL for the thank you page for the request that is displayed after the user requests the contact <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.6.">Calculation of indicators</head><p>1. "Compared to homepage" metric. This metric compares the conversion rates of the experiment page and the original page <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>. The following formula makes the comparison: The assist-to-recent conversions ratio results are from dividing the number of conversions. If a channel has repeatedly played an ancillary role on the path to one conversion, only one conversion is counted as an associate conversion for the metric. Associated conversions for different channels do not exclude each other. Associated conversion is taken into account for all channels that have an ancillary role in one conversion path <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>.</p><p>To view a subset of conversion funnels, you need to apply conversion segments instead of filters with filters. Using a filter profile can adversely affect the accuracy of Multi-Channel Funnels reports. Using means the creation of conditions to specify the conversion paths to be included in the segment. For example, to set up a conversion segment that contains only conversion courses that begin with example.com, you must specify the following <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>.</p><p>An Attribution Model is a rule or set of rules that defines how credits for sales and conversions are assigned to touchpoints with audiences in the path to conversions. For example, the Last Engagement attribute gives 100% credit to endpoints with audiences (i.e., clicks) that precede sales or conversions. The First Engagement attribute assigns 100% credit to the audience touchpoints that begin the path to conversions. Below is an example of attribution models. The calculated conversion value (and the number of modifications) for each marketing channel will vary according to the attribution model. A track that is mostly starting to drive conversions will have a higher conversion value than the Last Interaction attribution model, thanks to its attributive First Interaction model. A customer found the site by clicking on one of the paid ads. He returns in a week via a social network. On the same day, he produced a third time to get the goods -this time for one campaign through email. In the Attribution Model:</p><p> Last Interaction last touchpoint -in this case, channel email -receive 100% credit for the sale.</p><p> First Engagement, The first point of contact with your audience, is the paid ad channel -will get 100% credit for the sale.</p><p> Linear every touchpoint on the path to conversion -in this case, the Paid Advertising channel, social network feeds and email -share equal credit (33.3% each) credit for the sale.  Over time, audience touchpoints that are closest in time to sales or conversions get the most credit.</p><p>In this case, email and social network channels will receive most of the credit because the customer interacted with them on the conversion day. Since engagement with a paid ad occurred a week earlier, this channel will receive much less recognition.  Based on the position, 40% of the credit is assigned to the first interaction, 20% to intermediate interactions, and 40% to the last interaction. Feeds paid ad and email receives 40% credit, and social network -20%. Attribution Modelling lets you compare the impact of different attribution models on evaluating marketing channels. In the tool, select an attribution model (such as Last Interaction). Then the table will show the number of conversions (or, depending on your choice, the cost) for each channel calculated by the model you selected. You can select up to three attribution models at a time and compare the results of each one in the table. After importing cost data into AdWords or other similar information, columns will appear to help you analyse and compare the metrics. In addition to basic models, you can use attribution modelling to create, save, and apply a custom model that uses the rules specified by the moderator. It allows you to tailor the models specifically to the set of assumptions that need to estimate in the conversion path data. In the "Applying Special Credit Rules" section, you can specify conditions that determine touch points on the conversion path based on characteristics such as position (first, last, average, assist), touchpoint type (click, impression, direct visit), and also the type of campaign or traffic source (campaign, keyword, or other dimensions). After defining the touchpoints you want, you can specify how you would allocate the conversion credit for those points to other points <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>.</p><p>All the rules is determined by the relative distribution of loans. For example, a linear model splits the conversion credit equally between touchpoints. Therefore, on the way to a four-conversion conversion, each touchpoint will receive 25% credit. However, if a paid ad channel is credited with 2 points and the third point on the path is "Paid Ads" <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>, the credit will be applied as follows, as shown in Fig. <ref type="figure" target="#fig_17">15</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 15: Paid Ads Example</head><p>After applying multiple rules to a single point of contact, the weight of the credit rules overlap will multiply. The Last Interaction Model transfers 100% of the conversion price to the last channel that the user interacted with before purchasing or completing the conversion. Google Analytics uses this default model to pass conversion costs into reports that are not multi-channel funnels. Because the Last Interaction model is the default model for messages that do not relate to multi-channel funnels, it provides valuable results compared to other models. Also, suppose ads and campaigns are designed to attract people at the time of purchase or are primarily engaged in transactions and have sales cycles that do not reflect phase. In that case, the Last Interaction model may be acceptable <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>.</p><p>The First Interaction Model transfers 100% of the conversion cost to the first channel, with the user interacted. This model is acceptable if you are running ads or campaigns to create initial awareness. For example, if a brand is poorly known, you can focus on the keywords or channels that are the first to represent the brand to the customer <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>.</p><p>Model Line distributes equal credit to each channel interaction on the conversion path. The model is helpful if campaigns are designed to keep in touch with the customer and keep him informed throughout the sales cycle. In this case, each point is vital for the reflection process. If the sales cycle involves a brief reflection phase, you can use the Impairment Model over time. This model transfers most of the credit to the touchpoints that occurred in time closest to the conversion. If you run one-or two-day advertising campaigns, you can give more credibility to your interactions during the advertising days. In this case, the interactions that occurred a week before the promotion would receive only a tiny fraction of the credit compared to the touchpoints near the conversion. Over time, the Attenuation model appropriately credits touch points during the one or two days leading up to a conversion <ref type="bibr" target="#b119">[120]</ref><ref type="bibr" target="#b120">[121]</ref><ref type="bibr" target="#b121">[122]</ref><ref type="bibr" target="#b122">[123]</ref><ref type="bibr" target="#b123">[124]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Experiments, results and discussion</head><p>Fig. <ref type="figure" target="#fig_17">16</ref> shows a contextual diagram of data flows of a typical regional information resource, and Fig. <ref type="figure" target="#fig_17">17</ref> shows a detailed flow chart of a specific regional information resource. Model Position-based allows you to combine the Last Interaction and First Interaction models. Instead of giving all the credit to the first or last interaction, it can split between them. Typically, 40% of the credit is assigned to first and last interactions, and 20% is to intermediate interactions. If they value more points of contact, which introduced a user's brand and points that led to the sale, uses a model based on the position. Fig. <ref type="figure" target="#fig_16">18</ref> shows an ERD of a typical regional information resource.  where y1 is the number of administrators, y2 is the number of visitors, Cavg is the amount of content, Call is the total amount of content, ALL is useful information determined scale from 0 to 1.</p><p>The managed system based on Lotka-Volterra equations, also known as the predator-prey equations, looks like <ref type="bibr" target="#b124">[125]</ref><ref type="bibr" target="#b125">[126]</ref><ref type="bibr" target="#b126">[127]</ref><ref type="bibr" target="#b127">[128]</ref><ref type="bibr" target="#b128">[129]</ref><ref type="bibr" target="#b129">[130]</ref><ref type="bibr" target="#b130">[131]</ref><ref type="bibr" target="#b131">[132]</ref><ref type="bibr" target="#b132">[133]</ref><ref type="bibr" target="#b133">[134]</ref><ref type="bibr" target="#b134">[135]</ref><ref type="bibr" target="#b135">[136]</ref>:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Linearization of function:</head><p>Discrete-deterministic model of information system. To implement this system, you can use 1 of 2 machines: the Mealy or Moore machine <ref type="bibr" target="#b124">[125]</ref><ref type="bibr" target="#b125">[126]</ref><ref type="bibr" target="#b126">[127]</ref><ref type="bibr" target="#b127">[128]</ref><ref type="bibr" target="#b128">[129]</ref><ref type="bibr" target="#b129">[130]</ref><ref type="bibr" target="#b130">[131]</ref><ref type="bibr" target="#b131">[132]</ref><ref type="bibr" target="#b132">[133]</ref><ref type="bibr" target="#b133">[134]</ref><ref type="bibr" target="#b134">[135]</ref><ref type="bibr" target="#b135">[136]</ref>.   Z is request to the server, 1 Z is the processing of the request, 2</p><p>Z is running of the script, 3 Z is the connection to the database, 4 Z is generation and delivery of the page to the visitor. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 23</head><p>Discrete-stochastic model of information system Z0 Z1 Z2 Z3 Z4 1 0 0 0 0 0 0.8 1 0 0 0 0 0.4 0 0 0 0 0 0.5 1 0 0 0 0 0</p><p>Continuous-stochastic model of information system. Every day new articles and new information are added to the database. Therefore, there is nothing in the drive at the beginning of the day. Thus, the states of the subsystem will be described by the system of equations <ref type="bibr" target="#b124">[125]</ref><ref type="bibr" target="#b125">[126]</ref><ref type="bibr" target="#b126">[127]</ref><ref type="bibr" target="#b127">[128]</ref><ref type="bibr" target="#b128">[129]</ref><ref type="bibr" target="#b129">[130]</ref><ref type="bibr" target="#b130">[131]</ref><ref type="bibr" target="#b131">[132]</ref><ref type="bibr" target="#b132">[133]</ref><ref type="bibr" target="#b133">[134]</ref><ref type="bibr" target="#b134">[135]</ref><ref type="bibr" target="#b135">[136]</ref>:   Then the server transmits data to the script handler, the script itself to routing, and routing to modularity (Fig. <ref type="figure" target="#fig_22">22</ref>). There is the module search, GET query template.  The content type, module template, system module options, content and module itself are downloaded (Fig. <ref type="figure">24</ref>). The server outputs the generated page to the user in the browser.  </p><formula xml:id="formula_19">                 1 1 0 0 1 1 ,</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions</head><p>1. The analysis of ways of forming commercial content is carried out. The known models of a life cycle of content and the standardized services of management of content give the chance to define requirements for creating an optimum life cycle of commercial content. 2. Internet technologies for the construction of service-oriented e-commerce systems are studied, making it possible to classify e-commerce systems and e-content commerce systems. 3. Information resources and production processes of e-commerce systems are considered in detail, making it possible to develop an optimal content life cycle and a typical architecture of ecommerce systems. 4. The technology of content management in e-commerce is analyzed, allowing the development of formal models, unified methods and software tools for processing information resources in econtent commerce systems. 5. From the standpoint of a systematic approach, an analysis of modern methods and tools for designing, modelling, and implementing electronic content commerce systems and substantiated the need and feasibility of creating unified procedures and software for processing information resources.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>a) Viral marketing; b) basic directions of Internet marketing; c) areas of Internet marketing</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 3 :</head><label>3</label><figDesc>Purpose of search engine technology Search advertising Distribute information to search by placing keyword-targeted ads Search engine optimization Actions to change the status of an Web resource and elements of the external environment to gain high positions in search results Contextual advertising Advertise on thematic Web resources SEM technology (Fig. 3, a) has following characteristics [1-4]:  Context analysis (advertising site topics, etc.).  Dealing with queries by specific keywords.  Search Engagement (Website Search, Search Engines).  Increase of the Findability content of the Web site content (Fig. 3b). Technologies: a) search engine marketing and b) Findability</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 5 :</head><label>5</label><figDesc>Mechanisms a) research and b) content formation</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>key. In the case of hypotheses 1</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head></head><label></label><figDesc>is the union of terms from the content</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 6 :Figure 7 :</head><label>67</label><figDesc>Figure 6: Basic requirements for content management systems for the construction of e-commerce content systems</figDesc><graphic coords="13,72.10,72.00,459.35,145.90" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 8 :</head><label>8</label><figDesc>a) Requirements and b) CMS classification</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 9 :</head><label>9</label><figDesc>Figure 9: Classification of Internet newspapers</figDesc><graphic coords="19,76.68,320.35,450.25,163.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head></head><label></label><figDesc>Dynamics thematic content (relevance/ageing) is done linearly. The number of messages in the time t described by the formula</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_10"><head></head><label></label><figDesc>process of increasing the relevance/ageing of content is described by dependency      </figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_11"><head>W</head><label></label><figDesc>root of time, the process is independent increases (correlation between individual and m content is insignificant). A significant amount of dependent content is valid   indicates the presence of long-term system memory. Such systems make class-similar processes taking into account correlations between content at different times. of content in most operating in a steady-state characterized by maximum content space capacity N (the dimensionality of the parameters and their measurement are not taken into account). Each organization generator generates a stream of content on average constant for the number of signs and messages of Laziness. Over time, only the volume of notes on a topic changes. Increased number one topic content accompanied in decline in the range of another issue because of content per unit of time and the total number of all the possible problems. The part is   is weight content w is weight keyword content (it is a monotonically increasing function of n ) D is the number of keywords in the content ( 1 12 D ). Average weight University and locally keyword are</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_12"><head>Figure 10 :</head><label>10</label><figDesc>Figure 10: Context diagram of a typical regional information resource</figDesc><graphic coords="23,196.68,517.34,212.73,139.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_13"><head>Figure 13 :</head><label>13</label><figDesc>Figure 13: IDF3 diagram of a typical regional information resource</figDesc><graphic coords="25,82.68,577.54,441.00,144.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_14"><head></head><label></label><figDesc>if case Variation effective than the original:  Experiment Conversion Rate = 35%  Initial conversion rate = 25% Then, value index n is compared to your original variant is less effective than the original variant:  Experiment Conversion Rate = 20%  Initial conversion rate = 40% Metric value Compared to % original page</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_15"><head>Figure 16 :Figure 17 :</head><label>1617</label><figDesc>Figure 16: Contextual DFD is a typical regional information resource</figDesc><graphic coords="30,95.83,344.77,414.62,198.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_16"><head>Figure 18 :</head><label>18</label><figDesc>Figure 18: An ERD of a typical regional information resource</figDesc><graphic coords="31,87.83,72.00,430.70,241.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_17"><head>Type 1 :</head><label>1</label><figDesc>Mealy Machine (Fig.19-20,  </figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_18"><head>Figure 19 :</head><label>19</label><figDesc>Figure 19: Mealy Machine Example, where 0</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_19"><head>Figure 20 :</head><label>20</label><figDesc>Figure 20: Discrete-stochastic model of information system exampleTable 22 Mealy Machine Example Xi Zk Z0 Z1 Z2 Z3 Z4 Transitions between system statesX1 Z1 ----X2 -Z2 ---X3 --Z2 --X4 ---Z3 -X5 ----Z4 Exits X1 Y1 ----X2 -Y2 ---X3 --Y2 --X4 ---Y3 -X5 ----Y4</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_20"><head></head><label></label><figDesc>The mathematical expectation of the amount of content in the system<ref type="bibr" target="#b124">[125]</ref><ref type="bibr" target="#b125">[126]</ref><ref type="bibr" target="#b126">[127]</ref><ref type="bibr" target="#b127">[128]</ref><ref type="bibr" target="#b128">[129]</ref><ref type="bibr" target="#b129">[130]</ref><ref type="bibr" target="#b130">[131]</ref><ref type="bibr" target="#b131">[132]</ref><ref type="bibr" target="#b132">[133]</ref><ref type="bibr" target="#b133">[134]</ref><ref type="bibr" target="#b134">[135]</ref><ref type="bibr" target="#b135">[136]</ref>: With the help of the network model, I will build the principle of CMS work for the project (Fig.21). To begin with, a user has requested a server<ref type="bibr" target="#b124">[125]</ref><ref type="bibr" target="#b125">[126]</ref><ref type="bibr" target="#b126">[127]</ref><ref type="bibr" target="#b127">[128]</ref><ref type="bibr" target="#b128">[129]</ref><ref type="bibr" target="#b129">[130]</ref><ref type="bibr" target="#b130">[131]</ref><ref type="bibr" target="#b131">[132]</ref><ref type="bibr" target="#b132">[133]</ref><ref type="bibr" target="#b133">[134]</ref><ref type="bibr" target="#b134">[135]</ref><ref type="bibr" target="#b135">[136]</ref>:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_21"><head>Figure 21 :</head><label>21</label><figDesc>Figure 21: Network model example</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_22"><head>Figure 22 :</head><label>22</label><figDesc>Figure 22: Network model example</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_23"><head>Figure 23 :</head><label>23</label><figDesc>Figure 23: Network model example</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_24"><head>Figure 24 : 3 А</head><label>243</label><figDesc>Figure 24: Network model example</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_25"><head>Figure 25 :</head><label>25</label><figDesc>Figure 25: Aggregation system Example</figDesc><graphic coords="34,192.98,630.41,217.65,103.48" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="8,145.00,135.24,313.55,216.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="24,74.33,198.49,454.95,161.25" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="26,76.68,141.04,452.45,235.49" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="29,83.85,415.89,438.65,195.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Areas of influence of Internet marketing NameThe result of the impact of Internet marketing Musical industry</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 7</head><label>7</label><figDesc></figDesc><table><row><cell cols="2">Ambiguous definitions of content analysis</cell></row><row><cell>Author</cell><cell>Definition</cell></row><row><cell>D. Jerry, JJ.</cell><cell>The method of objective qualitative and systematic research of the content of</cell></row><row><cell>Jerry</cell><cell>communication media</cell></row><row><cell>D.</cell><cell>Systematic quantitative elaboration, evaluation, and interpretation of the form and</cell></row><row><cell>Mannheim,</cell><cell>content of the information source</cell></row><row><cell>R. Rich</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head></head><label></label><figDesc>The relation of reflexivity, symmetry, and transitivity is related to equivalence<ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref>, i.e. the relation of duplication. Each content</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>c according</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>i</cell></row><row><cell cols="8">to the above algorithm of coincidence of terms in signatures is assigned a vector with elements [9]:</cell></row><row><cell>ij a</cell><cell>1, 0,      </cell><cell>, інакше , i j cc </cell><cell>, at</cell><cell>U</cell><cell>B</cell><cell cols="2">11 a .............. a 1 n</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>n 1 a</cell><cell>nn a</cell></row></table><note>.</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 11</head><label>11</label><figDesc>Characteristics of major content management systems for the development of e-commerce content systems, developed by<ref type="bibr" target="#b3">[4]</ref> </figDesc><table><row><cell>N</cell><cell>Name systems manage ment content</cell><cell cols="3">Software Requirements Webserv Databa Langu er se age</cell><cell>Eas y to inst all</cell><cell>Learn ing curve</cell><cell>Session manage ment</cell><cell>User manage ment</cell><cell>Extensi bility</cell><cell>Scalab ility</cell><cell>In mes use of the</cell><cell>XHT ML / CSS</cell></row><row><cell cols="2">1 Ruby on</cell><cell>Apache,</cell><cell>MySQL,</cell><cell>Ruby</cell><cell>+/-</cell><cell>+/-</cell><cell>+/-</cell><cell>+/-</cell><cell>+</cell><cell>+</cell><cell>+/-</cell><cell>+</cell></row><row><cell></cell><cell>Rails</cell><cell>FastCGI</cell><cell>Postgre</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>SQL</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>2</cell><cell>Drupal</cell><cell>Apache</cell><cell>MySQL,</cell><cell>PHP</cell><cell>+/-</cell><cell>+/-</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell></row><row><cell></cell><cell></cell><cell>IIS</cell><cell>Postgre</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>SQL</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">3 Mambo</cell><cell>Apache</cell><cell>Apache</cell><cell>PHP</cell><cell>+</cell><cell>+/-</cell><cell>+/-</cell><cell>+</cell><cell>+/-</cell><cell>+</cell><cell>+/-</cell><cell>+</cell></row><row><cell></cell><cell></cell><cell>IIS</cell><cell>IIS</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>4</cell><cell>Typo3</cell><cell>Apache</cell><cell>Apache</cell><cell>PHP</cell><cell>-</cell><cell>-</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+/-</cell><cell></cell></row><row><cell></cell><cell></cell><cell>IIS</cell><cell>IIS</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">5 Movable</cell><cell>Apache</cell><cell>Apache</cell><cell>Perl</cell><cell>+</cell><cell>+/-</cell><cell>-</cell><cell>+/-</cell><cell>+/-</cell><cell>+</cell><cell>+/-</cell><cell>-</cell></row><row><cell></cell><cell>Type</cell><cell>IIS, Jetty</cell><cell>IIS,</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>Jetty</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>6</cell><cell>Word</cell><cell>Apache,</cell><cell>Apache</cell><cell>PHP</cell><cell>+</cell><cell>-</cell><cell>-</cell><cell>+/-</cell><cell>+/-</cell><cell>-</cell><cell>+/-</cell><cell>+</cell></row><row><cell></cell><cell>Press</cell><cell>mod_re</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell>write</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>7</cell><cell>Text</cell><cell>Apache</cell><cell>Apache</cell><cell>PHP</cell><cell>+</cell><cell>-</cell><cell>-</cell><cell>+/-</cell><cell>-</cell><cell>-</cell><cell>+/-</cell><cell>+</cell></row><row><cell></cell><cell>Pattern</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">8 Joomla!</cell><cell>Apache</cell><cell>MySQL</cell><cell>PHP</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head>Table 14</head><label>14</label><figDesc></figDesc><table><row><cell cols="3">Content life cycle classification [19-29]</cell></row><row><cell>Author</cell><cell>Stages</cell><cell>Features of the model</cell></row><row><cell>McKeever</cell><cell>collection,</cell><cell>Web Content Management has four levels of hierarchy: content,</cell></row><row><cell>Susan</cell><cell>delivery /</cell><cell>activity, output, and audience to illustrate WCM latitude [23]</cell></row><row><cell></cell><cell>publication</cell><cell></cell></row><row><cell>Bob</cell><cell>collection,</cell><cell>The build stage is the collection, creation, and editing,</cell></row><row><cell>Boiko</cell><cell>management,</cell><cell>management, workflows, reconciliation, versioning, archiving,</cell></row><row><cell></cell><cell>publication</cell><cell>syndication, metadata management [19]</cell></row><row><cell>Gerry</cell><cell>creation,</cell><cell></cell></row><row><cell>McGovern</cell><cell>editing,</cell><cell></cell></row><row><cell></cell><cell>publication</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_6"><head></head><label></label><figDesc>The model's focus is on the ability to organize the collection, management, storage, accumulation, and supply of the necessary information to the right people at the right time.Each stage is divided into sub-stages. For example, the planning stage consists of sub-stages of alignment, analysis, modelling, design. Stage of development -creation, collection, collecting, classification, editing<ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref>.The model is based on the principle of seven +/-two. That is, it allows making changes (increase/decrease the number of stages) in the model itself, depending on the purpose of Internet marketing.</figDesc><table><row><cell>State</cell><cell>development,</cell><cell>The archiving stage consists of the sub-stages of accumulation,</cell></row><row><cell>government</cell><cell>quality approval,</cell><cell>archiving, recycling. In addition, this model reflects three</cell></row><row><cell>of Victoria</cell><cell>publication,</cell><cell>significant aspects of Web content flow: status, process, and role</cell></row><row><cell>(Australia)</cell><cell>cancellation</cell><cell>(author content, quality management content, quality</cell></row><row><cell></cell><cell>publications,</cell><cell>management process, management records).</cell></row><row><cell></cell><cell>archiving</cell><cell></cell></row><row><cell>AIIM</cell><cell>capture /</cell><cell></cell></row><row><cell></cell><cell>absorption,</cell><cell></cell></row><row><cell></cell><cell>management,</cell><cell></cell></row><row><cell></cell><cell>accumulation,</cell><cell></cell></row><row><cell></cell><cell>delivery, storage</cell><cell></cell></row><row><cell>CMP</cell><cell>planning,</cell><cell></cell></row><row><cell>org-tion</cell><cell>development,</cell><cell></cell></row><row><cell></cell><cell>management,</cell><cell></cell></row><row><cell></cell><cell>deployment,</cell><cell></cell></row><row><cell></cell><cell>storage,</cell><cell></cell></row><row><cell></cell><cell>evaluation</cell><cell></cell></row><row><cell>Bob</cell><cell>organization,</cell><cell></cell></row><row><cell>Doyle</cell><cell>creation,</cell><cell></cell></row><row><cell></cell><cell>accumulation,</cell><cell></cell></row><row><cell></cell><cell>workflow,</cell><cell></cell></row><row><cell></cell><cell>version control,</cell><cell></cell></row><row><cell></cell><cell>publication,</cell><cell></cell></row><row><cell></cell><cell>archiving</cell><cell></cell></row><row><cell>Woods</cell><cell>legalization,</cell><cell>In the model, the focus is on the categories of problem-solving</cell></row><row><cell>Randy</cell><cell>template,</cell><cell>rather than the very stages from the initial (content creation) to</cell></row><row><cell></cell><cell>creation,</cell><cell>final (content publishing). Most content management issues fall</cell></row><row><cell></cell><cell>modification,</cell><cell>into one of the following categories: legal content migration,</cell></row><row><cell></cell><cell>version control,</cell><cell>reasoning template, content creation and reuse, controlled</cell></row><row><cell></cell><cell>rotation,</cell><cell>version and site rollback, content and end rotation, process</cell></row><row><cell></cell><cell>monitoring and</cell><cell>monitoring, and success management (results) [25].</cell></row><row><cell></cell><cell>success</cell><cell></cell></row><row><cell></cell><cell>management</cell><cell></cell></row><row><cell>Halverson</cell><cell>audit, analysis,</cell><cell></cell></row><row><cell></cell><cell>strategy,</cell><cell></cell></row><row><cell></cell><cell>classification,</cell><cell></cell></row><row><cell></cell><cell>structuring,</cell><cell></cell></row><row><cell></cell><cell>create, view,</cell><cell></cell></row><row><cell></cell><cell>re-viewing,</cell><cell></cell></row><row><cell></cell><cell>final viewing,</cell><cell></cell></row><row><cell></cell><cell>approval,</cell><cell></cell></row><row><cell></cell><cell>testing,</cell><cell></cell></row><row><cell></cell><cell>formatting,</cell><cell></cell></row><row><cell></cell><cell>publishing,</cell><cell></cell></row><row><cell></cell><cell>updating,</cell><cell></cell></row><row><cell></cell><cell>archiving.</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_7"><head>Table 15</head><label>15</label><figDesc></figDesc><table><row><cell>Content life cycle classification [19-29]</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Author</cell><cell>No</cell><cell cols="3">Development of information resources Formation Management Realization</cell></row><row><cell>McKeever S.</cell><cell>1</cell><cell>+/-</cell><cell>-</cell><cell>+/-</cell></row><row><cell cols="2">The State Victoria 2</cell><cell>+/-</cell><cell>-</cell><cell>+/-</cell></row><row><cell>Russell Nakano</cell><cell>3</cell><cell>+/-</cell><cell>-</cell><cell>+/-</cell></row><row><cell>Ann Rockley</cell><cell>4</cell><cell>+/-</cell><cell>+/-</cell><cell>+/-</cell></row><row><cell>Jo Ann Hackos</cell><cell>5</cell><cell>+/-</cell><cell>-</cell><cell>+/-</cell></row><row><cell>McGovern G.</cell><cell>6</cell><cell>+/-</cell><cell>-</cell><cell>+/-</cell></row><row><cell>Bob Boiko</cell><cell>7</cell><cell>+/-</cell><cell>+/-</cell><cell>+/-</cell></row><row><cell>Bob Doyle</cell><cell>8</cell><cell>+/-</cell><cell>+/-</cell><cell>+/-</cell></row><row><cell cols="2">CMP organization 9</cell><cell>+/-</cell><cell>+/-</cell><cell>-</cell></row><row><cell>AIIM</cell><cell>10</cell><cell>+/-</cell><cell>+/-</cell><cell>+/-</cell></row><row><cell>Woods Randy</cell><cell>11</cell><cell>+/-</cell><cell>+</cell><cell>+</cell></row><row><cell>Halverson</cell><cell>12</cell><cell>+</cell><cell>+/-</cell><cell>+/-</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_8"><head>Table 16</head><label>16</label><figDesc></figDesc><table><row><cell cols="2">Comparison of Web 1.0-2.0 parameters</cell><cell></cell><cell></cell></row><row><cell>Name</cell><cell>Web 1.0</cell><cell>Web 2.0</cell><cell>New properties</cell></row><row><cell></cell><cell>User developer or content</cell><cell>User as co-developer, reader as co-</cell><cell>The right to</cell></row><row><cell></cell><cell>creator and reader</cell><cell>author or partner</cell><cell>participate;</cell></row><row><cell>Actor</cell><cell></cell><cell></cell><cell>cancellation of third</cell></row><row><cell></cell><cell></cell><cell></cell><cell>party regulatory</cell></row><row><cell></cell><cell></cell><cell></cell><cell>side (moderation)</cell></row><row><cell></cell><cell>The software was created</cell><cell>Create software for the Web;</cell><cell>Web as a platform;</cell></row><row><cell>Software</cell><cell>for the PC; Software -goods; closed source</cell><cell>Software -service, application; open-source, API, open-source</cell><cell>removal and erosion of barriers and</cell></row><row><cell></cell><cell>codes, ARI; licensed sale;</cell><cell>software; The software may be</cell><cell>restrictions (free</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_9"><head>Table 17</head><label>17</label><figDesc>The main differences between ECS and ECCS<ref type="bibr" target="#b29">[30]</ref><ref type="bibr" target="#b30">[31]</ref><ref type="bibr" target="#b31">[32]</ref><ref type="bibr" target="#b32">[33]</ref><ref type="bibr" target="#b33">[34]</ref><ref type="bibr" target="#b34">[35]</ref><ref type="bibr" target="#b35">[36]</ref><ref type="bibr" target="#b36">[37]</ref><ref type="bibr" target="#b37">[38]</ref> </figDesc><table><row><cell>Characteristic</cell><cell>ECS</cell><cell>ECCS</cell></row><row><cell>Type of goods</cell><cell>Material</cell><cell>Intangible (content).</cell></row><row><cell>Volume of goods</cell><cell>Decreases</cell><cell>Constantly.</cell></row><row><cell>Availability of a warehouse</cell><cell>Present</cell><cell>Missing.</cell></row><row><cell>Product DB</cell><cell>Product description</cell><cell>Content and its description</cell></row><row><cell>Promotion</cell><cell>By keywords in the product</cell><cell>By keywords in the content</cell></row><row><cell>goods</cell><cell>description</cell><cell>description and the content</cell></row><row><cell></cell><cell></cell><cell>itself</cell></row><row><cell>Product search</cell><cell>By keywords in the product</cell><cell>By keywords in the content</cell></row><row><cell></cell><cell>description</cell><cell>description and the content</cell></row><row><cell></cell><cell></cell><cell>itself</cell></row><row><cell>Detection</cell><cell>Manually</cell><cell>Automatically</cell></row><row><cell>duplication</cell><cell></cell><cell>(programmatically),</cell></row><row><cell>goods</cell><cell></cell><cell>application of known methods</cell></row><row><cell></cell><cell></cell><cell>of detection and elimination of</cell></row><row><cell></cell><cell></cell><cell>duplication of information.</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_10"><head>Table 19</head><label>19</label><figDesc></figDesc><table><row><cell cols="2">Formal Content Management Models [9, 39-48]</cell></row><row><cell>Name</cell><cell>Formal Content Management Model</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_11"><head>Table 20</head><label>20</label><figDesc></figDesc><table><row><cell cols="2">CMS components [9, 39-48]</cell><cell></cell></row><row><cell>Model</cell><cell>Advantage</cell><cell>Drawback</cell></row><row><cell>R.E. Burton</cell><cell>Describes the ageing process of content, the</cell><cell></cell></row><row><cell>and R.W.</cell><cell>loss of its relevance. The equation of the</cell><cell></cell></row><row><cell>Kebler</cell><cell>model has an exact solution in an elementary</cell><cell></cell></row><row><cell></cell><cell>and convenient function -exponents. It is</cell><cell></cell></row><row><cell></cell><cell>determining the speed of development of</cell><cell></cell></row><row><cell></cell><cell>individual thematic.</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_12"><head>Table 21</head><label>21</label><figDesc>An example of analyzing content ad groups on an information resource Ad group topics CTR Impressions Bounce Rate Ad clicks Users who remain on the site</figDesc><table><row><cell>Theme 1</cell><cell>8%</cell><cell>1000</cell><cell>60%</cell><cell>80</cell><cell>32</cell></row><row><cell>Theme 2</cell><cell>6%</cell><cell>1000</cell><cell>30%</cell><cell>60</cell><cell>42</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_13"><head>Table 22 -</head><label>22</label><figDesc>23):</figDesc><table><row><cell>    1 z t y t                 , , 0,1, 2,...; , , 0,1, 2,...; z t x t t z t x t t        </cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_14"><head></head><label></label><figDesc>Pt is the probability of the system being in a state,    at time t, that is, n applications, we differentiate a system if it has n applications<ref type="bibr" target="#b124">[125]</ref><ref type="bibr" target="#b125">[126]</ref><ref type="bibr" target="#b126">[127]</ref><ref type="bibr" target="#b127">[128]</ref><ref type="bibr" target="#b128">[129]</ref><ref type="bibr" target="#b129">[130]</ref><ref type="bibr" target="#b130">[131]</ref><ref type="bibr" target="#b131">[132]</ref><ref type="bibr" target="#b132">[133]</ref><ref type="bibr" target="#b133">[134]</ref><ref type="bibr" target="#b134">[135]</ref><ref type="bibr" target="#b135">[136]</ref>:</figDesc><table><row><cell>    </cell><cell cols="2">n P t t P t n P t t P t    </cell><cell>1  </cell><cell cols="6">, t P t n t P t t            </cell><cell></cell><cell>n t P t  </cell><cell></cell><cell>t n</cell><cell></cell><cell>1,</cell></row><row><cell>where  </cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>z</cell><cell>n</cell><cell>t</cell><cell>Z</cell></row><row><cell></cell><cell>n dP</cell><cell>  t</cell><cell></cell><cell></cell><cell></cell><cell cols="2">   n P t</cell><cell cols="2">n P</cell><cell>1</cell><cell>  t</cell><cell>n P</cell><cell>1</cell><cell>  t</cell></row><row><cell></cell><cell></cell><cell></cell><cell>dt</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>0 dP</cell><cell>  t</cell><cell></cell><cell>0 P</cell><cell>  t</cell><cell>1 P</cell><cell>  t</cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>dt</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table><note>n</note></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Process analysis in electronic content commerce system</title>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Hasko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kuchkovskiy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Computer Sciences and Information Technologies</title>
				<meeting>the International Conference on Computer Sciences and Information Technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="120" to="123" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Information resources processing using linguistic analysis of textual content</title>
		<author>
			<persName><forename type="first">J</forename><surname>Su</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sachenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Burov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Intelligent Data Acquisition and Advanced Computing Systems Technology and Applications</title>
				<meeting>the International Conference on Intelligent Data Acquisition and Advanced Computing Systems Technology and Applications<address><addrLine>Romania</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="573" to="578" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Designing architecture of electronic content commerce system</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Computer Sciences and Information Technologies</title>
				<meeting>the International Conference on Computer Sciences and Information Technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="115" to="119" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Web content support method in electronic business systems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">B</forename><surname>Fernandes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Emmerich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">2136</biblScope>
			<biblScope unit="page" from="20" to="41" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Information Technology of Processing Information Resources in Electronic Content Commerce Systems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Computer Sciences and Information Technologies</title>
				<meeting>the International Conference on Computer Sciences and Information Technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="212" to="222" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Model and architecture for virtual library information system</title>
		<author>
			<persName><forename type="first">B</forename><surname>Rusyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pohreliuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Computer Sciences and Information Technologies</title>
				<meeting>the International Conference on Computer Sciences and Information Technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="37" to="41" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Network Modelling of Resource Consumption Intensities in Human Capital Management in Digital Business Enterprises by the Critical Path Method</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Matseliukh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bublyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kopach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Korolenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">2851</biblScope>
			<biblScope unit="page" from="366" to="380" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Automated Monitoring of Changes in Web Resources</title>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Burov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Oleshek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing</title>
				<imprint>
			<date type="published" when="1020">1020. 2020</date>
			<biblScope unit="page" from="348" to="363" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Basis of information flow integration</title>
		<author>
			<persName><forename type="first">D</forename><surname>Lande</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>Handbook, Engineering</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Analysis and evaluation of risks in electronic commerce</title>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Rishnyak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on CAD Systems in Microelectronics, 9th International Conference</title>
				<meeting>the International Conference on CAD Systems in Microelectronics, 9th International Conference</meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="332" to="333" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Developments in automatic text retrieval</title>
		<author>
			<persName><forename type="first">G</forename><surname>Salton</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">science</title>
		<imprint>
			<biblScope unit="volume">253</biblScope>
			<biblScope unit="page" from="974" to="980" />
			<date type="published" when="1991">5023. 1991</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Information retrieval</title>
		<author>
			<persName><forename type="first">G</forename><surname>Salton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Harman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Encyclopedia of computer science</title>
				<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="858" to="863" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><surname>Papka</surname></persName>
		</author>
		<title level="m">On-line News Event Detection, Clustering, and Tracking</title>
				<imprint>
			<date type="published" when="1999">1999</date>
		</imprint>
		<respStmt>
			<orgName>Amherst, Massachusetts University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<author>
			<persName><forename type="first">Metatorial</forename><surname>Services</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Inc</forename></persName>
		</author>
		<ptr target="http://metatorial.com/pagea.asp?id=poster" />
		<title level="m">The Content Management Possibilities Poster</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Content Management Interoperability Services. Part II -SOAP protocol binding</title>
		<author>
			<persName><forename type="first">Ibm</forename><surname>Emc</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<pubPlace>Hopkinton</pubPlace>
		</imprint>
	</monogr>
	<note>Microsoft. Version 0.5</note>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">Content Management Interoperability Services. Part II -REST protocol binding</title>
		<author>
			<persName><forename type="first">Ibm</forename><surname>Emc</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<pubPlace>Hopkinton</pubPlace>
		</imprint>
	</monogr>
	<note>Microsoft. Version 0.5</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Microsoft</title>
		<author>
			<persName><forename type="first">Ibm</forename><surname>Emc</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Content Management Interoperability Services. Part I. Version 0.5</title>
				<meeting><address><addrLine>Hopkinton</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m" type="main">Content Management Interoperability Services</title>
		<author>
			<persName><forename type="first">Ibm</forename><surname>Emc</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<pubPlace>Hopkinton</pubPlace>
		</imprint>
	</monogr>
	<note>Microsoft. Appendices. Version 0.5</note>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">Content management bible</title>
		<author>
			<persName><forename type="first">B</forename><surname>Boiko</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>John Wiley &amp; Sons</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m" type="main">Content Management for Dynamic Web Delivery</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hackos</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
			<publisher>Hoboken, Wiley</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">Content Strategy for the Web</title>
		<author>
			<persName><forename type="first">K</forename><surname>Halverson</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>New Riders Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><surname>Mcgovern</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Norton</surname></persName>
		</author>
		<title level="m">Content Critical</title>
				<imprint>
			<publisher>FT Press</publisher>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<title level="m" type="main">Understanding Web content management systems: evolution, lifecycle and market</title>
		<author>
			<persName><forename type="first">S</forename><surname>Mckeever</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
			<publisher>MCB UP</publisher>
			<biblScope unit="volume">103</biblScope>
			<biblScope unit="page" from="686" to="692" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<title level="m" type="main">Web content management: a collaborative approach</title>
		<author>
			<persName><forename type="first">R</forename><surname>Nakano</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
			<publisher>Addison Wesley Professional</publisher>
			<pubPlace>Boston</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<title level="m" type="main">Defining a Model for Content</title>
		<author>
			<persName><forename type="first">R</forename><surname>Woods</surname></persName>
		</author>
		<ptr target="URL:www.contentmanager.net/magazine/article_785_defining_a_model_for_content_governance.html" />
		<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<title level="m" type="main">Managing Enterprise Content: A Unified Content Strategy</title>
		<author>
			<persName><forename type="first">A</forename><surname>Rockley</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
			<publisher>New Riders Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Plagiarism, Duplicate Publication and Duplicate Submission: They Are All Wrong!</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">R</forename><surname>Stone</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Antennas and Propagation</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="47" to="49" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<monogr>
		<title level="m" type="main">Invisible Web Gets Deeper</title>
		<author>
			<persName><forename type="first">D</forename><surname>Sullivan</surname></persName>
		</author>
		<ptr target="http://searchenginewatch.com/sereport/article.php/2162871" />
		<imprint>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
	<note type="report_type">Search Engine Report</note>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<author>
			<persName><surname>Cmp</surname></persName>
		</author>
		<ptr target="http://www.cmprosold.org/resources/poster/" />
		<title level="m">CM Lifecycle Poster</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">The nature and measurement of meaning</title>
		<author>
			<persName><forename type="first">C</forename><surname>Osgood</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Psychological Bulletin</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="page" from="197" to="237" />
			<date type="published" when="1952">1952</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Method of Integration and Content Management of the Information Resources Network</title>
		<author>
			<persName><forename type="first">O</forename><surname>Kanishcheva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gozhyj</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">689</biblScope>
			<biblScope unit="page" from="204" to="216" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Web Resources Management Method Based on Intelligent Technologies</title>
		<author>
			<persName><forename type="first">A</forename><surname>Gozhyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Yevseyeva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kalinina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Gozhyj</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">871</biblScope>
			<biblScope unit="page" from="206" to="221" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">The method of web-resources management under conditions of uncertainty based on fuzzy logic</title>
		<author>
			<persName><forename type="first">A</forename><surname>Gozhyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kalinina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Gozhyj</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Computer Sciences and Information Technologies</title>
				<meeting>the International Conference on Computer Sciences and Information Technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="343" to="346" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<monogr>
		<title level="m" type="main">Computational analysis and understanding of natural languages: Principles, methods and applications</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">R</forename><surname>Rao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">N</forename><surname>Gudivada</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2018">2018</date>
			<publisher>Elsevier</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<monogr>
		<title level="m" type="main">Construe/TIS: A system for content-based indexing of a database of news stories</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">J</forename><surname>Hayes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">P</forename><surname>Weinstein</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1991">1991</date>
			<publisher>The AAAI Press/The MIT Press</publisher>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="49" to="64" />
			<pubPlace>Cambridge, MA</pubPlace>
		</imprint>
	</monogr>
	<note>of Innovative Applications of Artificial Intelligence</note>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Intellectual System Design for Content Formation</title>
		<author>
			<persName><forename type="first">O</forename><surname>Naum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kanishcheva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Computer Sciences and Information Technologies</title>
				<meeting>the International Conference on Computer Sciences and Information Technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="131" to="138" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">The Virtual Library System Design and Development</title>
		<author>
			<persName><forename type="first">B</forename><surname>Rusyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Emmerich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pohreliuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">871</biblScope>
			<biblScope unit="page" from="328" to="349" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<analytic>
		<title level="a" type="main">The Contextual Search Method Based on Domain Thesaurus</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Burov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Veres</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Rishnyak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">689</biblScope>
			<biblScope unit="page" from="310" to="319" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">Subject Domain Models of Jurisprudence According to Google Scholar Scientometrics Data</title>
		<author>
			<persName><forename type="first">D</forename><surname>Lande</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Dmytrenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Radziievska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR workshop proceedings</title>
		<imprint>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="32" to="43" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">Generation of Information Impacts Scenarios in Management Decision Support Systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Boychenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Lande</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International scientific-practical conference</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="175" to="185" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<monogr>
		<title level="m" type="main">A System for Analysis of Big Data from Social Media</title>
		<author>
			<persName><forename type="first">D</forename><surname>Lande</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Subach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Puchkov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2020">2020</date>
			<publisher>Information &amp; Security</publisher>
			<biblScope unit="volume">47</biblScope>
			<biblScope unit="page" from="44" to="61" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">Predictive Online Analysis of Social Transformations based on the Assessment of Dissimilarities between Government Actions and Society&apos;s Expectations</title>
		<author>
			<persName><forename type="first">M</forename><surname>Zgurovsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Boldak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Lande</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Yefremov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Perestyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 2nd International Conference on System Analysis &amp; Intelligent Computing</title>
				<meeting><address><addrLine>SAIC</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<analytic>
		<title level="a" type="main">Link prediction of scientific collaboration networks based on information retrieval</title>
		<author>
			<persName><forename type="first">D</forename><surname>Lande</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Fu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Guo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Balagura</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Gorbov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Yang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">World Wide Web</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="1" to="19" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<monogr>
		<title level="m" type="main">The Model&quot; Information Gatekeepers&quot; for Sentiment Analysis of Text Data</title>
		<author>
			<persName><forename type="first">N</forename><surname>Kunanets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Oliinyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kobylynskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rzheuskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Shunevich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Tomashevskyi</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2019">2019</date>
			<publisher>ICTERI</publisher>
			<biblScope unit="page" from="164" to="177" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b44">
	<analytic>
		<title level="a" type="main">Preferential information dynamics model for online social networks</title>
		<author>
			<persName><forename type="first">M</forename><surname>Fu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Feng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Guo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Le</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Lande</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Manko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Physica A: Statistical Mechanics and its Applications</title>
		<imprint>
			<biblScope unit="volume">506</biblScope>
			<biblScope unit="page" from="993" to="1005" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b45">
	<analytic>
		<title level="a" type="main">Dynamic model with super spreaders and lurker users for preferential information propagation analysis</title>
		<author>
			<persName><forename type="first">M</forename><surname>Fu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Feng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Lande</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Dmytrenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Manko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Prakapovich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Physica A: Statistical Mechanics and its Applications</title>
		<imprint>
			<biblScope unit="volume">561</biblScope>
			<biblScope unit="page">125266</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b46">
	<analytic>
		<title level="a" type="main">Data Science in Open-Access Research on-Line Resources</title>
		<author>
			<persName><forename type="first">D</forename><surname>Lande</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Andrushchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Balagura</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Second International Conference on Data Stream Mining &amp; Processing</title>
				<imprint>
			<publisher>DSMP</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="17" to="20" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b47">
	<analytic>
		<title level="a" type="main">The Model of Words Cumulative Influence in a Text</title>
		<author>
			<persName><forename type="first">D</forename><surname>Lande</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Snarskii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Manko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">XVIII International Conference on Data Science and Intelligent Analysis of Information</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="249" to="256" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b48">
	<analytic>
		<title level="a" type="main">Analysis features of information resources processing</title>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Computer Sciences and Information Technologies</title>
				<meeting>the International Conference on Computer Sciences and Information Technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="124" to="128" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b49">
	<analytic>
		<title level="a" type="main">Peculiarities of Content Forming and Analysis in Internet Newspaper Covering Music News</title>
		<author>
			<persName><forename type="first">M</forename><surname>Korobchinsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Computer Sciences and Information Technologies</title>
				<meeting>the International Conference on Computer Sciences and Information Technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="52" to="57" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b50">
	<analytic>
		<title level="a" type="main">The Risk Management Modelling in Multi Project Environment</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Veres</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Rishnyak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Rishnyak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Computer Sciences and Information Technologies</title>
				<meeting>the International Conference on Computer Sciences and Information Technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="32" to="35" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b51">
	<analytic>
		<title level="a" type="main">Linguistic Analysis of Textual Commercial Content for Information Resources Processing</title>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Modern Problems of Radio Engineering</title>
				<meeting>the International Conference on Modern Problems of Radio Engineering<address><addrLine>TCSET</addrLine></address></meeting>
		<imprint>
			<publisher>Telecommunications and Computer Science</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="709" to="713" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b52">
	<analytic>
		<title level="a" type="main">Application of Sentence Parsing for Determining Keywords in Ukrainian Texts</title>
		<author>
			<persName><forename type="first">L</forename><surname>Vasyl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Victoria</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Dmytro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Roman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Zoriana</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Computer Sciences and Information Technologies</title>
				<meeting>the International Conference on Computer Sciences and Information Technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="326" to="331" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b53">
	<analytic>
		<title level="a" type="main">Intelligent System for Semantically Similar Sentences Identification and Generation Based on Machine Learning Methods</title>
		<author>
			<persName><forename type="first">P</forename><surname>Zdebskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Burov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Rybchak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Kravets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Lozynska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Holoshchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kubinska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dmytriv</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR workshop proceedings</title>
		<imprint>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="317" to="346" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b54">
	<analytic>
		<title level="a" type="main">Electronic content commerce system development</title>
		<author>
			<persName><forename type="first">V</forename><surname>Andrunyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 13th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics</title>
				<meeting>13th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics</meeting>
		<imprint>
			<publisher>CADSM</publisher>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b55">
	<analytic>
		<title level="a" type="main">Model of Adaptive Language Synthesis Based on Cosine Conversion Furies with the Use of Continuous Fractions</title>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR workshop proceedings</title>
		<imprint>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="600" to="611" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b56">
	<analytic>
		<title level="a" type="main">Structural Modeling of Technical Text Analysis and Synthesis Processes</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bekesh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Kravets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Demchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Matseliukh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Batiuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Peleshchak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bigun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Maiba</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR workshop proceedings</title>
		<imprint>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="562" to="589" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b57">
	<analytic>
		<title level="a" type="main">Technology of commercial web-resource processing</title>
		<author>
			<persName><forename type="first">K</forename><surname>Alieksieieva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Berko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 13th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics</title>
				<meeting>13th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics</meeting>
		<imprint>
			<publisher>CADSM</publisher>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b58">
	<analytic>
		<title level="a" type="main">Method of Structural Semantic Analysis of Dental Terms in the Instructions for Medical Preparations</title>
		<author>
			<persName><forename type="first">R</forename><surname>Perkhach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kysil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Dosyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Zavuschak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hrendus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vasyliuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sadova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Prodanyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR workshop proceedings</title>
		<imprint>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="662" to="669" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b59">
	<analytic>
		<title level="a" type="main">Game Task of Ontological Project Coverage</title>
		<author>
			<persName><forename type="first">P</forename><surname>Kravets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Burov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Andrusyak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">2851</biblScope>
			<biblScope unit="page" from="344" to="355" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b60">
	<analytic>
		<title level="a" type="main">Stochastic Game Model of Data Clustering</title>
		<author>
			<persName><forename type="first">P</forename><surname>Kravets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Burov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Oborska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Dzyubyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">2853</biblScope>
			<biblScope unit="page" from="214" to="227" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b61">
	<analytic>
		<title level="a" type="main">Assessing Security Risks Method in E-Commerce System for IT Portfolio Management</title>
		<author>
			<persName><forename type="first">M</forename><surname>Bublyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Panasyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Brodyak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">2853</biblScope>
			<biblScope unit="page" from="462" to="479" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b62">
	<monogr>
		<title level="m" type="main">Development of the system to integrate and generate content considering the cryptocurrent needs of users</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kuchkovskiy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Bobyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Malanchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ryshkovets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Pelekh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Brodyak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Bobrivetc</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Panasyuk</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2019">2019</date>
			<publisher>Eastern-European Journal of Enterprise Technologies</publisher>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="18" to="39" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b63">
	<analytic>
		<title level="a" type="main">Methods of information resources processing in electronic content commerce systems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 13th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics</title>
				<meeting>13th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics</meeting>
		<imprint>
			<publisher>CADSM</publisher>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b64">
	<analytic>
		<title level="a" type="main">A Method to Solve Uncertainty Problem for Big Data Sources</title>
		<author>
			<persName><forename type="first">A</forename><surname>Berko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Alieksieiev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of International Conference on Data Stream Mining and Processing</title>
				<meeting>International Conference on Data Stream Mining and Processing</meeting>
		<imprint>
			<publisher>DSMP</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="32" to="37" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b65">
	<analytic>
		<title level="a" type="main">Quality evaluation of information resources in web-projects</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">Y</forename><surname>Berko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">A</forename><surname>Aliekseyeva</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Actual Problems of Economics</title>
		<imprint>
			<biblScope unit="volume">136</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="226" to="234" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b66">
	<analytic>
		<title level="a" type="main">Consolidated data models for electronic business systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Berko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of International Conference on The Experience of Designing and Application of CAD Systems in Microelectronics</title>
				<meeting>International Conference on The Experience of Designing and Application of CAD Systems in Microelectronics</meeting>
		<imprint>
			<publisher>CADSM</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="341" to="342" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b67">
	<analytic>
		<title level="a" type="main">Methods and models of data integration in E-business systems</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">Y</forename><surname>Berko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Actual Problems of Economics</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="17" to="24" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b68">
	<analytic>
		<title level="a" type="main">Models of data integration in open information systems</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">Y</forename><surname>Berko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Actual Problems of Economics</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="147" to="152" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b69">
	<analytic>
		<title level="a" type="main">An Intelligent System for Commercial of Information Products Distribution Based SEO and Sitecore CMS</title>
		<author>
			<persName><forename type="first">B</forename><surname>Rusyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pohreliuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kapshii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Varetskyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Demchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Karpov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gozhyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Gozhyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kalinina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR workshop proceedings</title>
		<imprint>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="760" to="777" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b70">
	<analytic>
		<title level="a" type="main">An Intelligent System for Generating End-User Symptom Recommendations Based on Machine Learning Technology</title>
		<author>
			<persName><forename type="first">S</forename><surname>Makara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Burov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Rybchak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Peleshchak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Peleshchak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Holoshchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kubinska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dmytriv</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR workshop proceedings</title>
		<imprint>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="844" to="883" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b71">
	<analytic>
		<title level="a" type="main">The Intellectual System Development of Distant Competencies Analyzing for IT Recruitment</title>
		<author>
			<persName><forename type="first">A</forename><surname>Rzheuskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kutyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Voloshyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kowalska-Styczen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Voloshyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Peleshko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Rak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing IV</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1080">1080. 2020</date>
			<biblScope unit="page" from="696" to="720" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b72">
	<analytic>
		<title level="a" type="main">Developing an Intelligent Online Learning System for Foreign Language Vocabulary Training Based on Gamification</title>
		<author>
			<persName><forename type="first">M</forename><surname>Hrendus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Andrunyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Yavir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ryshkovets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Khudyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Hryhorovych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Korobchynskyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR workshop proceedings</title>
		<imprint>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="1075" to="1101" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b73">
	<analytic>
		<title level="a" type="main">Modeling the Dynamics of Knowledge Potential of Agents in the Educational Social and Communication Environment</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bomba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nazaruk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kunanets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Pasichnyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing IV</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1080">1080. 2020</date>
			<biblScope unit="page" from="17" to="24" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b74">
	<analytic>
		<title level="a" type="main">Development of an Intelligent System for Selecting Songs According to the User Needs</title>
		<author>
			<persName><forename type="first">R</forename><surname>Kubik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ryshkovets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hrendus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Khudyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vysotskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Hryhorovych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chyrun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR workshop proceedings</title>
		<imprint>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="1251" to="1279" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b75">
	<analytic>
		<title level="a" type="main">Intelligent System of Passenger Transportation by Autopiloted Electric Buses in Smart City</title>
		<author>
			<persName><forename type="first">M</forename><surname>Bublyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Matseliukh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Motorniuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Terebukh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR workshop proceedings</title>
		<imprint>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="1280" to="1294" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b76">
	<analytic>
		<title level="a" type="main">A Complex System for Teaching Students with Autism: The Concept of Analysis. Formation of IT Teaching Complex</title>
		<author>
			<persName><forename type="first">V</forename><surname>Andrunyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Pasichnyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Antonyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Shestakevych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing IV</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1080">1080. 2020</date>
			<biblScope unit="page" from="721" to="733" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b77">
	<analytic>
		<title level="a" type="main">Information Modeling of Dual Education in the Field of IT</title>
		<author>
			<persName><forename type="first">R</forename><surname>Holoshchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Pasichnyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kunanets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Veretennikova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing IV</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1080">1080. 2020</date>
			<biblScope unit="page" from="637" to="646" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b78">
	<analytic>
		<title level="a" type="main">Online Tourism System Development for Searching and Planning Trips with User&apos;s Requirements</title>
		<author>
			<persName><forename type="first">N</forename><surname>Antonyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Medykovskyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Dverii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Oborska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Krylyshyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vysotsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Tsiura</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Naum</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing IV</title>
				<imprint>
			<publisher>Springer Nature Switzerland AG</publisher>
			<date type="published" when="1080">1080. 2020</date>
			<biblScope unit="page" from="831" to="863" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b79">
	<analytic>
		<title level="a" type="main">Choosing the method of finding similar images in the resverse seach system</title>
		<author>
			<persName><forename type="first">O</forename><surname>Veres</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Rusyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sachenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Rishnyak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">2136</biblScope>
			<biblScope unit="page" from="99" to="107" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b80">
	<analytic>
		<title level="a" type="main">A new method of fingerprint key protection of grid credential</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Varetskyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Rusyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Molga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ignatovych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent and Soft Computing</title>
				<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="volume">84</biblScope>
			<biblScope unit="page" from="99" to="103" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b81">
	<analytic>
		<title level="a" type="main">Web Content Monitoring System Development</title>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gozhyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Yevseyeva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Dosyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tyhonov</surname></persName>
		</author>
		<author>
			<persName><surname>Zakharchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">2362</biblScope>
			<biblScope unit="page" from="126" to="142" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b82">
	<analytic>
		<title level="a" type="main">Uniform Method of Operative Content Management in Web volume</title>
		<author>
			<persName><forename type="first">A</forename><surname>Gozhyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kowalska-Styczen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Lozynska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">2136</biblScope>
			<biblScope unit="page" from="62" to="77" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b83">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Burov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Rusyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pohreliuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Oleshek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gozhyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Bobyk</surname></persName>
		</author>
		<title level="m">Web Resource Changes Monitoring System Development</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">2386</biblScope>
			<biblScope unit="page" from="255" to="273" />
		</imprint>
	</monogr>
	<note>CEUR Workshop Proceedings</note>
</biblStruct>

<biblStruct xml:id="b84">
	<analytic>
		<title level="a" type="main">Individual Sign Translator Component of Tourist Information System</title>
		<author>
			<persName><forename type="first">O</forename><surname>Lozynska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Savchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Pasichnyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing IV</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1080">1080. 2020</date>
			<biblScope unit="page" from="593" to="601" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b85">
	<analytic>
		<title level="a" type="main">Heterogeneous Data with Agreed Content Aggregation System Development</title>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kowalska-Styczen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Burov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Berko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vasevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Pelekh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ryshkovets</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">2386</biblScope>
			<biblScope unit="page" from="35" to="54" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b86">
	<analytic>
		<title level="a" type="main">The Mobile Application Development Based on Online Music Library for Socializing in the World of Bard Songs and Scouts&apos; Bonfires</title>
		<author>
			<persName><forename type="first">B</forename><surname>Rusyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pohreliuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rzheuskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kubik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ryshkovets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vysotskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">B</forename><surname>Fernandes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing IV</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1080">1080. 2020</date>
			<biblScope unit="page" from="734" to="756" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b87">
	<analytic>
		<title level="a" type="main">Development of System for Managers Relationship Management with Customers</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Kis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Tsymbaliak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Lecture Notes in Computational Intelligence and Decision Making</title>
				<imprint>
			<date type="published" when="1020">1020. 2020</date>
			<biblScope unit="page" from="405" to="421" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b88">
	<analytic>
		<title level="a" type="main">Automated Information System for Connection to the Access Point with Encryption WPA2 Enterprise</title>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Rybak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Lecture Notes in Computational Intelligence and Decision Making</title>
				<imprint>
			<date type="published" when="1020">1020. 2020</date>
			<biblScope unit="page" from="389" to="404" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b89">
	<analytic>
		<title level="a" type="main">Methodical Approach to Assessing the Readiness Level of Technologies for the Transfer</title>
		<author>
			<persName><forename type="first">N</forename><surname>Chukhray</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Shakhovska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Mrykhina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bublyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Lisovska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing IV</title>
				<imprint>
			<publisher>Springer Nature Switzerland AG</publisher>
			<date type="published" when="1080">1080. 2020</date>
			<biblScope unit="page" from="259" to="282" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b90">
	<analytic>
		<title level="a" type="main">Economic evaluation and government regulation of technogenic (manmade) damage in the national economy</title>
		<author>
			<persName><forename type="first">O</forename><surname>Kuzmin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bublyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of International Conference on Computer sciences and information technologies</title>
				<meeting>International Conference on Computer sciences and information technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="37" to="39" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b91">
	<analytic>
		<title level="a" type="main">Consumer aspects in assessing the suitability of technologies for the transfer</title>
		<author>
			<persName><forename type="first">N</forename><surname>Chukhray</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Shakhovska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Mrykhina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bublyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Lisovska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of International Conference on Computer sciences and information technologies</title>
				<meeting>International Conference on Computer sciences and information technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="142" to="147" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b92">
	<analytic>
		<title level="a" type="main">Structuring the fuzzy knowledge base of the IT industry impact factors</title>
		<author>
			<persName><forename type="first">M</forename><surname>Bublyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Rybytska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Karpiak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Matseliukh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of International Conference on Computer sciences and information technologies</title>
				<meeting>International Conference on Computer sciences and information technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b93">
	<analytic>
		<title level="a" type="main">The model of fuzzy expert system for establishing the pollution impact on the mortality rate in Ukraine</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">I</forename><surname>Bublyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">M</forename><surname>Rybytska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of International Conference on Computer sciences and information technologies</title>
				<meeting>International Conference on Computer sciences and information technologies</meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="253" to="256" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b94">
	<analytic>
		<title level="a" type="main">The Popularization Problem of Websites and Analysis of Competitors</title>
		<author>
			<persName><forename type="first">T</forename><surname>Basyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">689</biblScope>
			<biblScope unit="page" from="54" to="65" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b95">
	<analytic>
		<title level="a" type="main">Popularization of website and without anchor promotion</title>
		<author>
			<persName><forename type="first">T</forename><surname>Basyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of International Scientific and Technical Conference on Computer science and information technologies</title>
				<meeting>International Scientific and Technical Conference on Computer science and information technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="193" to="195" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b96">
	<analytic>
		<title level="a" type="main">Innerlinking website pages and weight of links</title>
		<author>
			<persName><forename type="first">T</forename><surname>Basyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of International Scientific and Technical Conference on Computer science and information technologies</title>
				<meeting>International Scientific and Technical Conference on Computer science and information technologies</meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="12" to="15" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b97">
	<analytic>
		<title level="a" type="main">Mobile application for preliminary diagnosis of diseases</title>
		<author>
			<persName><forename type="first">E</forename><surname>Vasilevskis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Dubyak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Basyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Pasichnyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rzheuskyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">2255</biblScope>
			<biblScope unit="page" from="275" to="286" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b98">
	<analytic>
		<title level="a" type="main">Interoperability web application models based on microformats</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Shcherbak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CriMiCo, 21 International Crimean Conference: Microwave and Telecommunication Technology</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="57" to="58" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b99">
	<monogr>
		<title level="m" type="main">Devising a mathematical model for pattern-based enterprise data integration</title>
		<author>
			<persName><forename type="first">I</forename><surname>Galushka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Shcherbak</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2015">2015</date>
			<publisher>Eastern-European Journal of Enterprise Technologies</publisher>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="59" to="64" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b100">
	<monogr>
		<title level="m" type="main">Development of specialized services for predicting the business activity indicators based on micro-service architecture</title>
		<author>
			<persName><forename type="first">I</forename><surname>Oksanych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Shevchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Shcherbak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Shcherbak</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2017">2017</date>
			<publisher>Eastern-European Journal of Enterprise Technologies</publisher>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="50" to="55" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b101">
	<analytic>
		<title level="a" type="main">Information Model of the Tendering System for Large Projects</title>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Turok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Dyyak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR workshop proceedings</title>
		<imprint>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="1224" to="1236" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b102">
	<analytic>
		<title level="a" type="main">Zavuschak Intelligent System of Visualization and Creation of Choreographic Setting</title>
		<author>
			<persName><forename type="first">A</forename><surname>Stefanchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Lozynska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Basyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Oborska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vysotskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Mykich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR workshop proceedings</title>
		<imprint>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="1196" to="1223" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b103">
	<analytic>
		<title level="a" type="main">Application of Data Mining to Exchange Rate Influence Identification</title>
		<author>
			<persName><forename type="first">O</forename><surname>Veres</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Ilchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kots</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR workshop proceedings</title>
		<imprint>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="1117" to="1126" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b104">
	<analytic>
		<title level="a" type="main">Online Tourism System for Proposals Formation to User Based on Data Integration from Various Sources</title>
		<author>
			<persName><forename type="first">A</forename><surname>Vysotsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Dosyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Lyudkevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Antonyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Naum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vysotskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Slyusarchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Computer Sciences and Information Technologies</title>
				<meeting>the International Conference on Computer Sciences and Information Technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="92" to="97" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b105">
	<analytic>
		<title level="a" type="main">Information System of Photostock Web Galleries Based on Machine Learning Technology</title>
		<author>
			<persName><forename type="first">V</forename><surname>Andrunyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Berko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Rusyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pohreliuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Dokhniak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Karpov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Krylyshyn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR workshop proceedings</title>
		<imprint>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="1032" to="1059" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b106">
	<analytic>
		<title level="a" type="main">Development of Information System for Aggregation and Ranking of News Taking into Account the User Needs</title>
		<author>
			<persName><forename type="first">V</forename><surname>Andrunyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vasevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Chernovol</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Antonyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gozhyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Gozhyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kalinina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Korobchynskyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR workshop proceedings</title>
		<imprint>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="1127" to="1171" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b107">
	<analytic>
		<title level="a" type="main">Network Security Analysis Based on Consolidated Threat Resources</title>
		<author>
			<persName><forename type="first">O</forename><surname>Garasym</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Chernovol</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gozhyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Gozhyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kalinina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Rusyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pohreliuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Korobchynskyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR workshop proceedings</title>
		<imprint>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="1004" to="1018" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b108">
	<analytic>
		<title level="a" type="main">Architectural ontology designed for intellectual analysis of e-tourism resources</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Burov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Demchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Computer Sciences and Information Technologies</title>
				<meeting>the International Conference on Computer Sciences and Information Technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="335" to="338" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b109">
	<monogr>
		<title level="m" type="main">Design of a recommendation system based on Collaborative Filtering and machine learning considering personal needs of the user</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Shatskykh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kohut</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Petruchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Dzyubyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Bobrivetc</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Panasyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sachenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Komar</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2019">2019</date>
			<publisher>Eastern-European Journal of Enterprise Technologies</publisher>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="6" to="28" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b110">
	<analytic>
		<title level="a" type="main">Analysis and Estimation of Popular Places in Online Tourism Based on Machine Learning Technology</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Tverdokhlib</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Andrunyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Antonyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Dyyak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Naum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Uhryn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Basto-Fernandes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">2631</biblScope>
			<biblScope unit="page" from="457" to="470" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b111">
	<analytic>
		<title level="a" type="main">An intelligent system of the content relevance at the example of films according to user needs</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gozhyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kalinina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Shatskykh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Borzov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">2516</biblScope>
			<biblScope unit="page" from="1" to="23" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b112">
	<analytic>
		<title level="a" type="main">Consolidated Information Web Resource for Online Tourism Based on Data Integration and Geolocation</title>
		<author>
			<persName><forename type="first">N</forename><surname>Antonyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vysotsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Burov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Demchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Lyudkevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">І</forename><surname>Bobyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Computer Sciences and Information Technologies</title>
				<meeting>the International Conference on Computer Sciences and Information Technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="15" to="20" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b113">
	<analytic>
		<title level="a" type="main">Development of intellectual system for data de-duplication and distribution in cloud storage</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Osypov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Slyusarchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Slyusarchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Webology</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="1" to="42" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b114">
	<analytic>
		<title level="a" type="main">Promoting training of multi-agent systems</title>
		<author>
			<persName><forename type="first">P</forename><surname>Kravets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Burov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">2608</biblScope>
			<biblScope unit="page" from="364" to="378" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b115">
	<analytic>
		<title level="a" type="main">Dynamic Coordination of Strategies for Multi-agent Systems</title>
		<author>
			<persName><forename type="first">P</forename><surname>Kravets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ryshkovets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Vyshemyrska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Smailova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing</title>
		<title level="s">Lecture Notes in Computational Intelligence and Decision Making</title>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">1246</biblScope>
			<biblScope unit="page" from="653" to="670" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b116">
	<analytic>
		<title level="a" type="main">Information Resource Management Technology Based on Fuzzy Logic</title>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Berko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Kravets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Dzyubyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Bardachov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Vyshemyrska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Lecture Notes in Computational Intelligence and Decision Making</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">1246</biblScope>
			<biblScope unit="page" from="164" to="182" />
		</imprint>
	</monogr>
	<note>Advances in Intelligent Systems and Computing</note>
</biblStruct>

<biblStruct xml:id="b117">
	<analytic>
		<title level="a" type="main">Tourist Itineraries Plan Design Based on the Behavior of Bee Colonies</title>
		<author>
			<persName><forename type="first">D</forename><surname>Uhryn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Naum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Antonyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Dyyak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Demchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Rybchak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Batiuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Proceedings</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">2631</biblScope>
			<biblScope unit="page" from="516" to="539" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b118">
	<analytic>
		<title level="a" type="main">Qualitative and Quantitative Characteristics Analysis for Information Security Risk Assessment in E-Commerce Systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Gozhyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kalinina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sachenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kovalchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">2762</biblScope>
			<biblScope unit="page" from="177" to="190" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b119">
	<analytic>
		<title level="a" type="main">Methods and tools for web resources processing in e-commercial content systems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Berko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bublyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vysotsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Doroshkevych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of IEEE 15th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT</title>
				<meeting>IEEE 15th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT</meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="114" to="118" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b120">
	<monogr>
		<title level="m" type="main">Advanced web metrics with Google Analytics</title>
		<author>
			<persName><forename type="first">B</forename><surname>Clifton</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
			<publisher>John Wiley &amp; Sons</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b121">
	<analytic>
		<title level="a" type="main">Google analytics</title>
		<author>
			<persName><forename type="first">B</forename><surname>Clifton</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Podrobný průvodce webovými statistikami</title>
				<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="volume">1</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b122">
	<analytic>
		<title level="a" type="main">Monitoring global digital gender inequality using the online populations of Facebook and Google</title>
		<author>
			<persName><forename type="first">R</forename><surname>Kashyap</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Fatehkia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">A</forename><surname>Tamime</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Weber</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Demographic Research</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="page" from="779" to="816" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b123">
	<monogr>
		<author>
			<persName><forename type="first">H</forename><surname>Davis</surname></persName>
		</author>
		<title level="m">Google advertising tools: Cashing in with AdSense, AdWords, and the Google APIs</title>
				<imprint>
			<publisher>O&apos;Reilly Media, Inc</publisher>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b124">
	<monogr>
		<title level="m" type="main">Advanced Google AdWords</title>
		<author>
			<persName><forename type="first">B</forename><surname>Geddes</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014">2014</date>
			<publisher>John Wiley &amp; Sons</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b125">
	<analytic>
		<title level="a" type="main">Web service interaction modeling with colored petri nets</title>
		<author>
			<persName><forename type="first">A</forename><surname>Gozhyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kalinina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Gozhyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS</title>
				<meeting>International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS</meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="319" to="323" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b126">
	<analytic>
		<title level="a" type="main">Methods for Forecasting Nonlinear Nonstationary Processes in Machine Learning</title>
		<author>
			<persName><forename type="first">P</forename><surname>Bidyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gozhyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kalinina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Communications in Computer and Information Science</title>
		<imprint>
			<biblScope unit="volume">1158</biblScope>
			<biblScope unit="page" from="470" to="485" />
			<date type="published" when="2020">2020</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b127">
	<analytic>
		<title level="a" type="main">Development, validation and testing of the Bayesian network to evaluate the national law enforcement agencies&apos; work</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvynenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Savina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pyrtko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Voronenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Baranenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Lopushynskyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 9nd International Conference on Advanced Computer Information Technologies</title>
				<meeting>9nd International Conference on Advanced Computer Information Technologies</meeting>
		<imprint>
			<publisher>ACIT</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="252" to="256" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b128">
	<analytic>
		<title level="a" type="main">Bayesian Networks&apos; Development Based on Noisy-MAX Nodes for Modeling Investment Processes in Transport</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvynenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Savina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Krejci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Voronenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Yakobchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kryvoruchko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">2386</biblScope>
			<biblScope unit="page" from="1" to="10" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b129">
	<analytic>
		<title level="a" type="main">The use of Bayesian methods in the task of localizing the narcotic substances distribution</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvynenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">І</forename><surname>Lurie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Voronenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Savina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Krejci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Fefelov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Lopushynskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Vorona</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE 14th International Scientific and Technical Conference on Computer Sciences and Information Technologies</title>
				<meeting>the IEEE 14th International Scientific and Technical Conference on Computer Sciences and Information Technologies</meeting>
		<imprint>
			<publisher>CSIT</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="60" to="63" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b130">
	<analytic>
		<title level="a" type="main">Development, Validation and Testing of the Bayesian Network of Educational Institutions Financing</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvynenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Savinа</surname></persName>
		</author>
		<author>
			<persName><forename type="first">М</forename><surname>Voronenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Doroschuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Smailova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">О</forename><surname>Boskin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kravchenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of International Conference on The crossing point of Intelligent Data Acquisition &amp; Advanced Computing Systems and East &amp; West Scientists</title>
				<meeting>International Conference on The crossing point of Intelligent Data Acquisition &amp; Advanced Computing Systems and East &amp; West Scientists</meeting>
		<imprint>
			<publisher>IDAACS</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="412" to="418" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b131">
	<analytic>
		<title level="a" type="main">Optimal Strategy for the Development of Insurance Business Structures in a Competitive Environment</title>
		<author>
			<persName><forename type="first">R</forename><surname>Yurynets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Yurynets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Myshchyshyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Zhyhaylo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pekhnyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">2631</biblScope>
			<biblScope unit="page" from="79" to="94" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b132">
	<analytic>
		<title level="a" type="main">Econometric Analysis of the Impact of Expert Assessments on the Business Activity in the Context of Investment and Innovation Development</title>
		<author>
			<persName><forename type="first">R</forename><surname>Yurynets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Yurynets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kokhan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR workshop proceedings</title>
		<imprint>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="680" to="694" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b133">
	<analytic>
		<title level="a" type="main">Specialized Interactive Methods for Using Data on Radar Application Models</title>
		<author>
			<persName><forename type="first">A</forename><surname>Vasyliuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Basyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">2631</biblScope>
			<biblScope unit="page" from="1" to="11" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b134">
	<analytic>
		<title level="a" type="main">Development of the Dynamic Bayesian Network to Evaluate the National Law Enforcement Agencies&apos; Work</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvynenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Savinа</surname></persName>
		</author>
		<author>
			<persName><forename type="first">М</forename><surname>Voronenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pashnina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Baranenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Krugla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Lopushynskyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The crossing point of Intelligent Data Acquisition &amp; Advanced Computing Systems and East &amp; West Scientists</title>
				<imprint>
			<publisher>IDAACS</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="418" to="424" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b135">
	<analytic>
		<title level="a" type="main">Information Encryption Based on the Synthesis of a Neural Network and AES Algorithm</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Peleshchak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Peleshchak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 3rd International Conference on Advanced Information and Communications Technologies</title>
				<meeting>3rd International Conference on Advanced Information and Communications Technologies</meeting>
		<imprint>
			<publisher>AICT</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="447" to="450" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
