=Paper= {{Paper |id=Vol-2870/paper121 |storemode=property |title=Application of Online Marketing Methods and SEO Technologies for Web Resources Analysis within the Region |pdfUrl=https://ceur-ws.org/Vol-2870/paper121.pdf |volume=Vol-2870 |authors=Volodymyr Kuchkovskiy,Vasyl Andrunyk,Maksym Krylyshyn,Lyubomyr Chyrun,Anatolii Vysotskyi,Sofia Chyrun,Nataliia Sokulska,Ilona Brodovska |dblpUrl=https://dblp.org/rec/conf/colins/KuchkovskiyAKCV21 }} ==Application of Online Marketing Methods and SEO Technologies for Web Resources Analysis within the Region== https://ceur-ws.org/Vol-2870/paper121.pdf
Application of Online Marketing Methods and SEO Technologies
for Web Resources Analysis within the Region
Volodymyr Kuchkovskiya, Vasyl Andrunyka, Maksym Krylyshyna, Lyubomyr Chyrunb,
Anatolii Vysotskyic, Sofia Chyrunc, Nataliia Sokulskad, Ilona Brodovskae
a
     Lviv Polytechnic National University, S. Bandera Street, 12, Lviv, 79013, Ukraine
b
     Ivan Franko National University of Lviv, University Street, 1, Lviv, 79000, Ukraine
c
     Anat Company, Chervona Kalyna Avenue, 104, Lviv, 79049, Ukraine
d
     Hetman Petro Sahaidachnyi National Army Academy, Heroes of Maidan Street, 32, Lviv, 79012, Ukraine
e
     Limited Liability Company Financial Company Absolute Finance, E. Konovaltsya Street, Kyiv, 01133, Ukraine


                Abstract
                This article presents the content analysis methods for information Web resources within a
                particular region. The model describes content analysis for processing Web resources in online
                marketing and simplifies the content automation management technology. The main problems
                of semantic and syntactic content analysis and functional services for textual content
                management are analysed. The rapid growth of Internet and e-business facilitates the publication
                and moderation of articles, which offers an intelligent system of marketing decisions to distribute
                content from a specific region to a particular target audience. The article describes developing
                information technology for processing Web resources of e-commerce based on online marketing
                and SEO methods. A new approach to the e-business processes application and implementation
                to such intelligent systems building is formulated. Processing content and information resource
                methods based on SEO technology and online marketing are described. Software for content and
                information resource processing is developed.

                Keywords 1
                Content, business process, management system, SEO-technology, Google analytics, targeting,
                information resource, content management, typical regional information resource, search engine,
                internet marketing, search engine marketing, content analysis, content management system,
                conversion path, conversion rate, attribution model, content management interoperability
                service, direct marketing, target audience, web content management, web site, commerce content
                system, processing information resource, e-commerce content, post-click analysis, formal
                content management model, content creation

1. Introduction
    Available content management technology is online marketing with Public relations, information
management, Internet integration, customer service and sales in various fields [1-4]. Online marketing
utilizes all essentials and aspects of traditional marketing in conjunction with new research methods (e.g.,
viral marketing) and information analysis using modern IT [5-9]. These relatively constant contact with
users are effective thanks to the automatic tracking of statistics, which uses the Return on Investment
(ROI), Rate of Return (ROR) and visitor efficiency to analyse or convert in e-commerce. The primary



COLINS-2021: 5th International Conference on Computational Linguistics and Intelligent Systems, April 22–23, 2021, Kharkiv, Ukraine
EMAIL: forgta.team@gmail.com (V. Kuchkovskiy); vasyl.a.andrunyk@lpnu.ua (V. Andrunyk); maksym.krylyshyn.mnsa.2020@lpnu.ua (M.
Krylyshyn); Lyubomyr.Chyrun@lnu.edu.ua (L. Chyrun), anat1957@gmail (A. Vysotskyi); chyrunsofia@gmail.com (S. Chyrun);
natalya.sokulska@gmail.com (N. Sokulska); Ilonabrodovska@gmail.com (I. Brodovska)
ORCID: 0000-0002-7941-6329 (V. Kuchkovskiy); 0000-0003-0697-7384 (V. Andrunyk); 0000-0002-2964-9546 (M. Krylyshyn); 0000-0002-
9448-1751 (L. Chyrun), 0000-0001-9190-7051 (A. Vysotskyi); 0000-0002-2829-0164 (S. Chyrun); 0000-0002-3425-5517 (N. Sokulska); 0000-
0001-8838-7788 (I. Brodovska)
             ©️ 2021 Copyright for this paper by its authors.
             Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
             CEUR Workshop Proceedings (CEUR-WS.org)
purpose of online marketing is to get the maximum effect from the potential audience of the site with the
ability to demand, sales, and visits statistics, etc. [10-12].

2. Related works
   Online marketing involves using strategies and areas of traditional marketing and the particular regions
of research that apply to the Internet space e-business (Fig. 1, Table 1). Online marketing is not only
content trading but also e-business models, software, content spaces, etc. [1-4]. Google, Yahoo, and MSN
have taken it to the next level and segmented the online advertising market by offering e-commerce in-
house advertising services. Due to the automation of the audience research process, the return on
investment is increasing, and costs are decreasing. The online marketing advantages: the possibility of
the most accurate targeting (Table 2-4), interactivity, the opportunity of post-click analysis to maximize
website conversion rates and ROR/ROI of online advertising [1-4].




 а)                                                 b)




   c)
Figure 1: a) Viral marketing; b) basic directions of Internet marketing; c) areas of Internet marketing

Table 1
Areas of influence of Internet marketing
    Name                            The result of the impact of Internet marketing
   Musical       In the music industry, many consumers have started buying and downloading MP3
   industry                         music over the Internet instead of buying a CD
   Banking      Online banking is convenient for the customer because it eliminates the need for him
     case                             to visit the bank or its branches each time
  Auctions       Online auctions have gained popularity. Unique things found in flea markets are now
                      on sale at online auctions such as eBay and more. Auction development has
                             dramatically influenced the prices of unique and antique items.
 Advertising    The impact on the advertising industry has been and still is enormous. Over the years,
  market             online advertising has grown steadily, reaching tens of billions of dollars a year.
                       Advertisers have begun to change their priorities actively, and today online
                                 advertising already occupies a significant market niche.
   Market       It increases the volume and geography of portable electronic devices (mobile phones,
  portable           players, etc.) using modern marketing methods to promote the product to the
   devices                                          Internet market.
      E-          Increase the volume, shorten the cycle of production/sale of intangible goods, and
 commerce                                       provide relevant services.
  content
  Internet        Online shopping sites have long ceased to be bulletin boards, some of which have
    sites          become large corporations that provide a range of marketing services. Prices for
                participation in such venues (privileged membership) are also increasing, despite their
                                                   increasing number.

   Site conversion is the ratio of the number of visitors to the site. It is who completed the targeted actions
(hidden / direct instructions from advertisers, sellers, content formation, visits a particular page of a site,
passing through an advertising link), to the total number of visitors site [1-9].

Table 2
Basic Elements of Internet Marketing
     Name                                                   Definition
    Product       An object sold via the Internet through a Web site; has its price and decent quality,
                 is in demand, competes with similar things of other Web sites and traditional stores.
      Price       Controlled quantitative indicator of the cost of goods with the following properties:
                 much lower than in a regular store due to cost savings; regularly compared to prices
                                                for similar competing products.
  Promotion       A set of methods of promoting the site on the Internet and goods, which includes a
                  vast arsenal of tools (search promotion, contextual advertising, banner advertising,
                    e-mail marketing, affiliate (affiliate, English. Affiliate) marketing, viral marketing,
                          hidden marketing, interactive advertising, work with blogs and more
     Place         Point of sale (Web site), where graphic design and usability play a significant role,
                    the usability of the site, quality of processing applications from the site, speed of
                      loading, work with payment systems, terms of delivery, work with customers
                                               before, during and after the sale.
    Marketing        Processes aimed at creating/increasing demand and achieving e-business goals
    Trends                through Internet technologies to maximize customer/product needs.

Table 3
Areas of Internet Marketing
      Name                                              Characteristic
     Display         An effective way to promote (increase visits) and a powerful tool to improve the
   advertising      image of website owners. Static/animated image ads (often Web-banner size 468
      Media             × 60 pixels), linked via a hyperlink from the advertiser or a page with more
   advertising       information. Together with content advertising is one of the significant formats
    or banner        of advertising on the Internet. Classic Web Banner - A GIF, SWF or JPG image file
   advertising        with static/animated image. Web banners are also created using Flash or Java
                      technologies. Unlike traditional (bitmap) graphics, they use vector graphics to
                     implement animation and sound effects at a small size, increasing the banner's
                                           effectiveness as an advertising medium.
  Post-click         An effective way to increase sales and marketing results by focusing on website
  marketing              visitors who are responsive to Internet marketing activities (pay per click
                                  advertising, HTML email, search to increase conversions)
    Target -         The advertising mechanism (Table 4) isolates from the entire existing audience
      goal           only the part that meets the set criteria (for example, the target audience) and
                                                shows the advertisement to it.
   Content-            The advertising principle focuses on the website content, either manually or
   targeted           automatically as a banner or text ad. The most robust contextual advertising -
  advertising        Geo-Targeting, to choose geographic display pages. Show time frame limits are
                                                         also applied.
   Search              A set of measures is aimed at increasing search engine traffic. Previously, the
   engine             search result meant only links to relevant pages (usually on the left side of the
  marketing,           page). Now they include advertisements on the right side of the page. Most
    SEM              search engine technologies do not allow you to achieve your advertising goals:
                        they do not always directly report the advertised product or service; do not
                    continuously pursue the purpose of sale; with their help, it is challenging to raise
                      brand awareness; it is not possible to bring a new product to the market. The
                    results of using any search engine technology can be two: attracting users to the
                         site, and for each case, the characteristics of that audience are different;
                         disseminating information about your site or business to search engines.
 Social media            Optimization for social media, a set of purely technical measures aimed at
 optimization,          transforming the site content so that it can be used as simply as possible in
     SMO                                     online communities (forums, blogs)
 Social Media             Promoting or promoting anything in social media (blogs, forums, online
  Marketing,                                            communities)
     SMM
     Direct          A type of marketing communication is based on direct personal communication
  marketing         with the recipient (B2C consumer or B2B client) to build relationships and profit.
   using the           Direct marketing is based on the attitude towards the client as an individual,
    e-mail,          provides feedback and does not use information brokers for communication. In
 RSS and more       Western marketing, direct marketing is referred to as BTL events (below the line,
                     used instead of ATL - direct advertising), which combines promotions, Direct e-
                      mail, exhibitions, POS and more. Direct marketing often uses direct mailing to
                    the target audience via email, e-mail, SMS and more. Direct marketing is focused
                      not on the target groups but individual individuals. Direct marketing activities
                       require creating a database of clients - structured, constantly updated fresh
                     information about individuals or legal entities and their consumer preferences
                     and needs to further process this information and formulate a product offering
                     that meets their needs. Databases in direct marketing are closely linked to the
                     CRM concept of customer or customer relationship management, allowing you
                      to consolidate all customer information and streamline all stages of customer
                               relationships from marketing and sales to after-sales service.
       Viral        Guidelines are based on encouraging individuals to pass on a marketing message
 marketing and          to other individuals that create the potential for exponential growth in the
viral advertising       impact of the news. Like viruses, such techniques use every opportunity to
                                       increase the number of messages transmitted.
  Guerrilla         A marketing concept is that seeks to find a firm/entrepreneur in their marketing
  marketing                 niche, refusing to compete openly with their powerful competitors,
                    concentrating efforts on segregated areas of the front, and using non-traditional
                      but effective ways to advertise and promote their products/services. Partisan
                        marketing is characterized by flexibility and mobility, sometimes called low-
                                                      budget/low-cost.
     Aiming          A method is for increasing Internet marketing success through the technology of
    Precision        retaining existing customers, cross-selling and up-selling. Precision analysis and
    marketing            ROI / ROR e-business and conversion rate allow you to get sales statistics,
                      demand, and more instantly. Emphasizes the relevance of commercial content
                       that is achieved directly through the personal preferences of site visitors, the
                            collection and analysis of users' behavioural and transactional data.

Table 4
Types of targeting
        Name                                                Definition
    Selection of     The most popular targeting type. It is done by selecting the advertising sites so
     advertising                        that their visitors match the target audience.
    playgrounds
      Thematic                 Show content ads on websites that are relevant to the content.
      targeting
    Orientation    Display advertising (contextual advertising) by the interests of visitors to the site.
    by interests
   Geo-targeting     Shows ads to a target audience that is restricted to a specific geographic region
  (geo-targeting)                                  selected by the advertiser.
    Orientation         It allows you to limit your ad delivery by the time of day (morning/evening,
   by Showtime                             weekdays/weekends), weeks, and years.
        Socio-          Display ads that focus on a specific class of target audience: split ads by the
   demographic                     target audience by age, gender, revenue, position, etc.
      targeting
   Quantity limit    It allows you to adjust the number of impressions of the advertising medium to
  impressions to     one unique user as he interacts with the advertising platform. Most commonly
 one to the user                     used in banner ads with pay per 1000 impressions.
    Behavioural     The most promising direction to date is to introduce a mechanism for collecting
      targeting                         user actions on the Internet through cookies.
         Geo-      AlterGeo first mentioned the concept. The bottom line is that knowing about the
        dinky         object's movement (the exact location up to the institution where the thing is
      targeting     located can determine modern geo-social services. For example, AlterGeo.ru). It
                        stops at some points, and you can represent the habits and passions of the
                          object. For instance, if a thing goes to a beerhouse, the beer is probably
                                                           interested.
       Psycho-       Also, one of the most promising areas is based on information on psychological
        angry          qualities (psycho-type, society), various advertising is published. Theoretical
      targeting                                     background - Socionics.
         MSB       The newest technology, the essence of which is: For each customer, based on the
   (Matrix Shop    specifics of communication of their managers with clients, a behavioural matrix is
     Behaviors)    created, which contains not only stereotypical models of thinking of customers in
                         this business model, but also weighting coefficients of their importance in
                         percentage. This detail allows you to evaluate the site's quality (structure,
                   usability, design, the text content), not at the level of good/bad, but the group of
                                                         specific figures.

  Staying in touch with users is effective thanks to the automatic tracking of statistics, which uses
ROI/ROR rates and Web resources conversion to analyse. The modification or performance of Web
resource visit is the ratio of the number of information resource visitors who completed the targeted
activity to the total number of Web site visitors [3]. It is hidden/direct instructions from sellers,
advertisers, and content creators, i.e. subscribe, purchase, sign up, visit of a particular Web resource page,
and navigate to an advertising link (Table 5) [1-4].




Figure 2: Main directions of Internet representation

Table 5
The online marketing advantages, developed by [1, 3 - 4]
        Name                                              Definition
    Interactivity     The principle of organizing a system where the goal is achieved by exchanging
   (Interaction )                content between the environment and system elements
  Search Engine          The increasing search engine traffic, generating search results lists and
     Marketing                                    advertisements (Table 6)
      Targeted       An advertising mechanism allows you to allocate an information resource from
     advertising        the entire audience to a target resource that meets the set criteria for its
                                                         advertising
      Post-click     A post-click marketing method that maximizes the performance and conversion
       analysis                        of your information resource and Internet ROI

    Usability user is total fertility convenience when using the object. The user interfaces development of
e is focused on the maximum visual/psychological comfort; coefficient of efficiency of execution of menu
design and system of navigation on the information resource; convenience and ease of use, user-
friendliness, and practicality of the user interface.

Table 6
Search engine-marketing (SEM) technology developed by [1]
     Technology                            Purpose of search engine technology
  Search advertising        Distribute information to search by placing keyword-targeted ads
    Search engine          Actions to change the status of an Web resource and elements of the
     optimization              external environment to gain high positions in search results
      Contextual                           Advertise on thematic Web resources
      advertising
   SEM technology (Fig. 3, a) has following characteristics [1-4]:
     Context analysis (advertising site topics, etc.).
     Dealing with queries by specific keywords.
     Search Engagement (Website Search, Search Engines).
     Increase of the Findability content of the Web site content (Fig. 3b).




          a)




                      b)
Figure 3: Technologies: a) search engine marketing and b) Findability

    Usability – user is a general convenience factor when using object; the user interfaces development
focused on the maximum visual/psychological convenience; menu design performance and site
navigation; convenience and ease of use, user-friendliness, and practicality of the software interface.
Search engine marketing does not reach advertising goals due to the following factors [3]: they do not
always directly report the advertised product; do not continuously pursue the purpose of selling the
product/service; with their help, it is challenging to increase brand recognition; it is impossible to market
a new service /product/content.
    Using SEM result is [3]:
    1. Attracting users to an information resource where the audience differs on a case-by-case basis,
        therefore attracting a broad (increasing attendance rate of the Web resource) or an interested
        audience;
    2. Content dissemination about Web resources in SEO.
    The criterion of a successful SEM strategy is the number of visitors to the Web resource and the quality
of the resulting audience. A simple measure for checking the popularity of Web resource is the dynamics
of the number of external links to the Web resource and the increase in references to the name of a
service/product/content or company trademark. The marginal case of SEO and contextual advertising is
the placement of advertisements in the content search results of the Web resource. The development of
the Internet has fostered new search engine marketing technologies for social networks (Video Marketing
Marketing). The separation of search engine marketing into a separate standalone strategy is associated
with [1]:
     The continued growth of the Internet market;
     The growth of the contextual / search advertising market;
     Using SEO technology [1];
     The need for optimal surfing/navigation in content;
     Supporting the complex content lifecycle process it goes through while managing the various
        stages of publishing.
   The process of designing and creating an electronic content commerce systems (ECCS) based on the
results of online marketing is iterative and proceeds from analysis, design, plan development to prototype
creation and experimental testing, starting with the specification, layout, template creation, content
formation, and content according to the structure of the information resource (Fig. 4).




Figure 4: Internet marketing for e-commerce content systems

   Concentrate on end-user business goals and needs. In the initial stages, users are connected to the
definition/development of functional requirements using survey letters, design alternatives, and
prototypes of varying degrees of readiness. They collect valuable information, giving users a sense of
direct involvement in the design process and gaining their trust.
   A well-known method of analysing textual information is that content analysis is a standard research
method in the social sciences (Fig. 42, Table 7-9). The subject is the analysis of the content of text arrays
and communicative correspondence (comments, forums, electronic mail, articles, etc.). The concept of
content analysis is not uniquely defined [4], so systems built on different approaches are incompatible.
Applying the content analysis to e-commerce content systems offers several benefits for simplifying your
business and resolves some problems facing business process participants, namely:
   1. Filtering user content on an information resource;
   2. The ability to automatically create a portrait of a regular user based on the analysis of his
        comments;
   3. The ability to automatically create a "portrait" of the target audience based on the analysis of
        "portraits" of regular users;
   4. Reducing the number of moderators of the information resource in the ECS;
   5. Reducing the time for posting user content on an information resource due to its automatic
        processing, not by moderators;
   6. Elimination of the language barrier due to the automatic formation of dictionaries of regular users
        and automatic translation.

Table 7
Ambiguous definitions of content analysis
    Author                                            Definition
  D. Jerry, JJ.    The method of objective qualitative and systematic research of the content of
     Jerry                                     communication media
       D.       Systematic quantitative elaboration, evaluation, and interpretation of the form and
  Mannheim,                               content of the information source
    R. Rich
   V. Ivanov       The qualitative and quantitative method of document research (characterized by
                      the objectivity of conclusions and rigour of the procedure) and quantitative
                   processing of the text further interprets the results. The subject of the study - the
                   problems of social reality, which are expressed and hidden in the documents, and
                                          the internal laws of the object of study
  B. Krasnov      It consists of searching in the text definite meaningful concepts (units of analysis),
                   identifying the frequency of their appearance and correlation with the content of
                                                   the whole document
  E. Tarshish     Research technique for obtaining results by analysing the content of the text about
                                         the state and properties of social reality

Table 8
The main components of content analytic research
     Name                Properties of the main components of content analytic research
  Observation     Elaboration of the mass of texts, using the typical sociological procedures of
                 continuous/selective observation, with the observance of representativeness
                                                  requirements
  Structuring    The assumption of structuring, segmentation, dismemberment of texts or the
               separation of meaningful invariants (repetition in all / several texts) in the studied
                                                 mass population
 Formalization They ensure the uniformity of segmentation and isolation of invariants, application
                of a high degree of formalization, strict operating rules and formal algorithms in
                                              analytical procedures
  Abstracting     Formalized separation of whole texts or selection of individual elements for
                       subsequent collection using the analytical and synthetic procedures
    Analysis   Use of probability theory and mathematical statistics methods for text processing.

Table 9
Types of content analysis methods
   Name             Quantitative (meaningful)                         Quality (structural)
 Definition       A study of words, topics, and          A study that examines not its content but its
               messages that focuses on content.                      form and structure
  Example As a first step, the researcher should          Determining the period or amount of print
                create a dictionary in which each         space that is assigned to a topic in a given
                 observation will identified and         source, or how many words or columns are
                   assigned to the appropriate            allocated to each topic in the appropriate
                            category.                                      category.
  Feature         Before analysing the selected            The specific weights of P each topic and
             linguistic units, predict their content   category are calculated ( P  R T , where R is the
              (create a dictionary) and determine      number of units of this category, T is the total
              each possible observation result by      number of units) and a comparative analysis of
                 the researcher's expectations.          the relevant topics is carried out to further
                                                                 predict events, processes.

    Most definitions of content analysis are constructive, that is, procedural (Table 7). Due to different
initial approaches, they generate different algorithms, which are sometimes contradictory [1]. The most
questionable is the neglect of the role of context (Table 8). The practical importance of the method avoids
many contradictions. Rev ' union means, and methods of natural selection and repeated evaluation of the
results obtained provide the opportunity to release or confirm factual knowledge and power/utility toolkit
(tab. 9). Content analysis is a quantitative and qualitative analysis of text arrays for further meaningful
interpretation of the obtained quantitative and qualitative patterns. The method is to create from a variety
of text an abstract model of content. It is used to analyse sources invariant by structure/content in the form
of unsystematic, disorderly organized text [1].
    The content analysis of commercial text content is used to determine the tone of the text, duplicate
content, and spam and identify new events to identify thematic plots of text content.
    Content analysis is used to study sources invariant in structure/content and existing as non-systematic,
disorderly organized textual material [6]. The method of content analysis is to form from a variety of text
material abstract models of the text's content. There are two methods of content analysis: quantitative and
qualitative. In a study of the mechanisms of generating textual information, it is found in [6] that the
choice of a text description model depends on constructing a probabilistic linguistic test and organizing
the selection from the text of its units. Probabilistic modelling of textual information and its components
is an introductory, preparatory stage for describing the functions of linguistic units in the text. The study
of language and speech functioning through probabilistic modelling of content relies on quantitative
linguistics, probability theory, mathematical statistics, information theory, and combinatorics. In
linguistic studies, especially during the implementation of content search algorithms [6], there are
constant problems associated with predicting the occurrence of a certain number of word-forms/phrases
in specific classes in a segment. Probabilistic modelling of text and syllables, word combinations,
grammatical categories allows determining the sample required to provide the corresponding linguistic
unit [6]. Quantitative evaluations of content information in text, words, and phrases (Fig. 5, a) are obtained
based on the meaning of syntactic information and using the idea of contextual conditioning [6].




a)                                               b)
Figure 5: Mechanisms a) research and b) content formation

    During the experiment of guessing letters of unknown text in work [6], it was noticed that the
participants of the investigation make their hypotheses about the most probable continuation of the text,
based on two types of combinatorial constraints: combinatorics of figures (letters and syllables) and
combinatorics of signs (morphemes, words, words ). The experiment shows that even at the fourth or fifth
letter steps, the combinatorics of letters and syllables are suppressed by the constraints related to the
compatibility of morphemes and words. As the text is expanded, word combinations are compounded
with word combinations and sentences, and restrictions associated with the combinatorics of paragraphs,
chapters, book sections, or articles appear. Thus, when guessing letters located at a sufficient distance
from the beginning of the text, the experiment participant relies not on the statistical combinatorics of
letters and syllables but on the text's meaningful (lexical-grammatical) construction. Suppose the content
removed from the original text section acts as a quantitative assessment of the distribution (distribution)
and letter statistics. In that case, the syntactic information obtained from the outer areas of the text serves
as a reflection of meaningful (semantic-pragmatic) information. These considerations make it possible to
propose a content analysis method for quantifying meaningful information in text and its segments. In
identifying new events, stream content consistently to the input ECCS using scanning or content router
and thematically selected results (Fig. 5, b) identify new developments in the content description [2, 8].
For them, they form story chains of similar content [8-10]. Content that reflects new events is the basis
of interdependent content clusters (Table 10) [11-13]. Each set can be the basis for the formation of a
complete story chain.
Table 10
Processes for detecting new events [11-13]
  Author                                     Stages of discovering new events
 G. Salton      1. The first content under review is the first cluster. Each cluster is represented by a
                vector of terms (keywords) included in the content of that cluster. The term vector,
              normalized in some way, is a centroid. Sometimes centroid is content that is closest in
             some measure to the term vector of a given cluster, which does not change the essence
                                                  of this algorithm [11-12].
              2. Each subsequent content is compared to the centroids of the existing clusters (some
                                            degree of closeness is introduced).
              3. If the content is closed enough for some cluster, it is attributed to that cluster, after
                                    which the corresponding centroid is enumerated.
              4. If the content is not close to the existing clusters, then a new set is formed to which
                                                 such content is attributed.
               5. The time range of the content under consideration is commonly referred to as the
             "observation window". Clusters whose entire content is outside the observation window
                                           are taken out of the scope of review.
                The algorithm, as a result, every new cluster that arises corresponds to a new event
                                         reflected in the content of that cluster.
 R. Papka 1. Requests for general topics are formed (using Text Mining techniques - identifying and
                                          selecting concepts from content) [13].
                                2. New incoming content is compared to existing requests.
                         3. If the content does not respond, it is associated with a new event.
               4. A new request corresponding to such content is included in the system (optional).

    Determining the content tone based on text analysis is more complex than detecting spam. When
seeing spam, consider two hypotheses (spam, not spam) and select the vibrant colour style (positive,
negative, neutral) and their combinations. The Bayesian method uses spam databases to determine spam,
two content corpses, one of which is made up of spam and the other is not [8]. For each content, the
frequency of use of each word and the weight rating (0 to 1) are calculated, that is, the conditional
probability that the content with that word is spam [9]. Weight values close to ½ are not considered in the
integrated calculation, so talks with such weights are ignored and deleted. The hypothesis space contains
the Tonality  H1 (negative), Tonality  H 0 (neutral) and Tonality  H1 (positive) key. In the case of
hypotheses H1 from the set with a positive tone, choose the terms specific to this content. They choose
words t with a probability calculated by Bayes formula and greater than ½. Decisions about the content
tonality are made considering the difference between the values of the weighted estimates of the
hypotheses H1 and H 1 [9]. According to the Paul Graham method, if the content n contains terms with
the weighted forecast w1 ,..., wn , then the conditional probability of spam occurrence [9-12] is based on
the data from the evaluation bodies and is calculated as
                                                        
                                      Spm   wi /  wi  1  wi  .          
  If S is an event that is that list is spam, A is an event that a letter has contains the word t. According to
Bayes’ formula [9].
                                                            P A | S  PS 
                                   P  S | A                                         .
                                                                                
                                                  P A | S  PS   P A | S P S
   To detect such content ci and duplicate c j , the rule of reflectivity is valid, but the condition of
transitivity is not fulfilled ci   c j,c j   ck  ci    ck . The content is similar to the text in the mix that
includes it, but the combination is not like it. Alternatively, content identical to the other two is compiled,
but the originals are significantly different. For the duplication relation, symmetry and transitivity are
performed, that is, ci  c j  c j  ci and ci  c j , c j  ck  ci  ck . The relation of reflexivity, symmetry,
and transitivity is related to equivalence [1-8], i.e. the relation of duplication. Each content ci according
to the above algorithm of coincidence of terms in signatures is assigned a vector with elements [9]:
                                            1, ci  c j ,          a11 a1n
                                      aij                 , at U  .............. .
                                             0, інакше,         B
                                                                      an1   ann
   In the analysis of similarity criteria, the conditions of symmetry i, j : aij  a ji and transitivity are
used i, j, k : aij  1, a jk  1  aik  1 , changing the volume of comparison terms to find the
corresponding coefficients [110-111], i.e.
            N N              N N                  N N N               N N      
              a ij a ji    a ij    0 and    a ij a jk a ik    a ij    max ,
             
            i j                                    
                                                        i j k                         
                             i j                                      i j      
where N is the amount of content. The asymmetry coefficient is associated with the definition of
duplicates approximately and the transitivity level with completeness.
    When new events are detected from a content stream sequentially fed to an ECCS input from a scanner
or content router and selected on a thematic request, recent events are described in the content [9-15]. For
them, they form story chains of similar content. Content that reflects new possibilities is the basis of
interdependent content clusters [9-12]. The collection becomes the basis for the formation of the story
                                                n
chain ut1  sim  ci , Dictionary    , ut   sim  ci , Dictionary    , where n is the volume of content
                                          2
                                               j 2

flow; c1 is current content; cn is the latest content; ci is i the content; Dictionary is the dictionary;
sim  ci , c j  is a measure of the content's proximity i to j; sim  ci , Dictionary  is a measure of the closeness
of the content to the dictionary,  and  are empirically determined parameters [9]. If the content is a
plurality of terms ci  wik   w : w  ci  , then ci  c j  w : w  ci | w  c j  it is the union of terms from
the content ci and c j into a vector Ei  eik  of dimension N, which is defined as
                                                                              e11 e1n
                                          1, wik  ci ,
                                    eik                      that is E  .............. .
                                          0, wik  ci ,
                                                                              en1 enn
   The proximity measure is given
                                                                N          
                                            sim  ci , c j     eik e jk  N .
                                                                k 1       
   In [9], the proximity apparatus uses a conditional probability apparatus (the entry of some term w into
the content ci , provided that it is included in the content c j ).
   To develop ECCS, a Web Content management system, CMS [1-3], if it meets a specific set of
requirements (Fig. 6). CMSs do not support the entire life cycle of the content stream and do not solve
the main problems of information resource development is content creation and maintenance [4]. The
main disadvantage of CMS is the lack of communication between the input information, the content and
the output information (Fig. 7) [14-18].
   Usually, such systems are used to store and publish a large amount of content (documents, images,
music, videos, etc.). Such CMSs allow you to manage text and graphics content by providing users with
convenient tools for storing and publishing information. CMS is a tool (Table 11) for modelling the
branched structures of information resources in the SEC and managing their content [1-13] without
special technical skills such as programming or HTML layout. CMS is developed to generate content
using dynamic collection and content caching, so its safety [2]. CMS provides control over access to the
information resource and changes and aims to simplify managing the information resource while
maintaining the flexibility of settings and management. The main components of the information resource
in CMS are presented in Table 12 [14-18].
Figure 6: Basic requirements for content management systems for the construction of e-commerce
content systems




Figure 7: The main components of content management systems for the construction of ECCS

Table 11
Characteristics of major content management systems for the development of e-commerce content
systems, developed by [4]
      Name       Software Requirements                                                              In
                                              Eas
     systems                                         Learn   Session    User                       use   XHT
                                              y to                              Extensi   Scalab
 N   manage    Webserv      Databa    Langu           ing    manage    manage                       of   ML /
                                              inst                               bility    ility
      ment       er           se       age           curve    ment      ment                       the   CSS
                                               all
     content                                                                                       mes
 1   Ruby on   Apache,      MySQL,    Ruby    +/–    +/–      +/–       +/–       +         +      +/–    +
       Rails   FastCGI      Postgre
                              SQL
 2   Drupal    Apache       MySQL,    PHP     +/–    +/–       +         +        +         +       +     +
                 IIS        Postgre
                              SQL
 3   Mambo      Apache      Apache    PHP      +     +/–      +/–        +       +/–        +      +/–    +
                   IIS         IIS
 4    Typo3     Apache      Apache    PHP      -       -       +         +        +         +      +/–
                   IIS         IIS
 5   Movable    Apache      Apache    Perl     +     +/–        -       +/–      +/–        +      +/–    -
      Type     IIS, Jetty     IIS,
                             Jetty
 6    Word     Apache,      Apache    PHP      +       -        -       +/–      +/–        -      +/–    +
      Press    mod_re
                write
 7     Text    Apache       Apache    PHP      +       -        -       +/–        -        -      +/–    +
     Pattern
 8   Joomla!   Apache       MySQL     PHP      +      +        +         +        +         +       +     +
   Using CMS does not require software installation. They use a browser for editing and administration.
The intuitive interface and ease of use of the system make it easier to manage the information resource
and reduce its cost. [14-18]. CMS includes the following features: rapid updating and retrieval of content
in an information resource; collecting customer and lead data; forming and editing polls; analysis of
information resource visit. There are large streams and volumes of different content in ECCS. Most of
these streams of content drawn from easily formalized and automated procedures and commercial
content. However, there is no overall approach to formalizing, designing, developing and implementing
the ECS. Such systems do not describe or disclose the relationships and dependencies between input data,
commercial content, output data and processes of processing information resources (Table 12).

Table 12
The main components of the subsystem of processing of information resources, developed by [1-4]
          Name                               Feature Content management system
      Menu items           Adding, editing, managing menu items of information resources of any
                                                               level
         Articles         Adding, editing, scheduling and publishing articles (information resource
                                                              pages)
          News                                Adding, editing, and publishing news
      Photo gallery      The ability to do photo galleries with sub-galleries, automatic photo zoom
          Board                Adding ads with photos, descriptions and contact information
         Settings          Storage of all settings of the information resource and its management
                                                              system
          Users                          Management of the rights of registered users
      Catalogue of              Adding, editing, publishing firms in subgroups of any nesting
       companies
           Poll                             Adding / editing polls results as graphs

    The value of the content determines its attractiveness to the consumer. Integrating content makes an
attractive resource and the integration of applications - useful [14-18]. Using CMS does not require
software installation. They use a browser for editing and administration. The intuitive interface and ease
of use of the system make it easier to manage the information resource and reduce the further costs of
maintaining it. [14-18]. CMS includes the following features: rapid updating and retrieval of content in
an information resource; collecting customer and lead data; forming and editing polls; analysis of
information resource visit.

3. Materials and methods
3.1. Content management tools in e-commerce
   Several content lifecycle models (Tables 13-14) are proposed and described by several authors with
properties supported set by different technologies and processes [19-29].

Table 13
Define the term content [1-18]
  Appointment                                     Define the term content
     Algebra       For example, the common determinant of the coefficients is the value among the
                    plurality of data (the largest, smallest, average computation time of a function).
  Measurement              An additive function that determines the value of a field (variable)
      theory
  Web content                            The information published on the Internet
  Media content     The published information by users, designers, or administrators of Web portals,
                                               such as audio/video/graphics.
   Quantitative                                 Volume, sphere, space, size
   determinant
     Applied         System of definitions or semantics of language; subject matter/question formed
    Linguistics        in the form of a book or document; part of the language being examined, for
                      example, content in a sentence - noun or verb; the information conveyed in a
                               conversation and easily perceived after reading and analysing.
   Formatted         Encoded format for displaying melons, such as password hash or private/public
    content                                   key for network communication.
  Free content        Published material that is legally protected by copyright through free licenses.
  Open content             Published material free use based on creating material for publications
  Mathematical            An object that contains contextual information (explaining an area or its
   Linguistics                     meaning, explaining the difference between objects)
  Content table       The content of the document, for example, the contents of a scientific book or
                                                  administrative document
   Information        The object of an information resource of predefined form; text content on the
   Technology                                              Website

Table 14
Content life cycle classification [19-29]
   Author              Stages                                  Features of the model
  McKeever           collection,       Web Content Management has four levels of hierarchy: content,
    Susan            delivery /           activity, output, and audience to illustrate WCM latitude [23]
                    publication
     Bob             collection,              The build stage is the collection, creation, and editing,
    Boiko         management,            management, workflows, reconciliation, versioning, archiving,
                    publication                      syndication, metadata management [19]
    Gerry             creation,         Knowledge, content and map information are suitable for three
  McGovern             editing,             key processes: creation, editing, publishing. Creation is an
                    publication       approximate definition of knowledge for a particular idea or set of
                                         ideas. Editing is the process of modifying professional content
                                         with these ideas in mind. The publication is the submission of
                                       content to the right person at the appropriate time. The creating,
                                      editing and publishing processes are required to generate content
                                           benefits. Thus, the benefits of content are described by the
                                                  formula: ContentBenefit  Create  Edit  Publish. [22]
    JoAnn             creation,             The module covers the concept of metadata. She is deeply
   Hackos            archiving,            immersed in terms of metadata and how it should be used.
                      drafting/              Focuses is on data legalization, database searching, and
                   combination,        information transformation into knowledge. The author gives an
                    publication           idea of the correspondence of information accumulation to a
                                         solid and stable information model. She describes a merger of
                                              usability ideas, information architecture, and content
                                              management in the model to focus on end-users [20].
     Ann              creation,        The creation phase consists of planning, designing, authorization,
   Rockley            revision,             and verification. A unified content strategy is a systematic
                  management,              method of identifying all the major content requirements to
                      delivery        create consistently structured content, reuse, manage recognised
                                        content sources, and edit content based on user requirements
                                                                   and needs [26].
  Russell        presentation,      The author paid particular attention to the process of managing
  Nakano          comparison,        Web content, including collecting versions and simultaneous
                     updates,                                changes [24].
                     mergers,
                   publication
  The State     development,        The archiving stage consists of the sub-stages of accumulation,
government     quality approval,       archiving, recycling. In addition, this model reflects three
 of Victoria      publication,     significant aspects of Web content flow: status, process, and role
 (Australia)      cancellation           (author content, quality management content, quality
                 publications,               management process, management records).
                     archiving
   AIIM              capture /       The model's focus is on the ability to organize the collection,
                  absorption,      management, storage, accumulation, and supply of the necessary
                management,               information to the right people at the right time.
                accumulation,
               delivery, storage
   CMP              planning,       Each stage is divided into sub-stages. For example, the planning
  org-tion      development,         stage consists of sub-stages of alignment, analysis, modelling,
                management,          design. Stage of development - creation, collection, collecting,
                 deployment,                          classification, editing [11-15].
                      storage,
                    evaluation
    Bob          organization,      The model is based on the principle of seven +/- two. That is, it
   Doyle             creation,     allows making changes (increase/decrease the number of stages)
                accumulation,          in the model itself, depending on the purpose of Internet
                    workflow,                                  marketing.
               version control,
                  publication,
                     archiving
  Woods           legalization,      In the model, the focus is on the categories of problem-solving
  Randy             template,       rather than the very stages from the initial (content creation) to
                     creation,      final (content publishing). Most content management issues fall
                 modification,        into one of the following categories: legal content migration,
               version control,        reasoning template, content creation and reuse, controlled
                     rotation,         version and site rollback, content and end rotation, process
                monitoring and             monitoring, and success management (results) [25].
                      success
                 management
 Halverson      audit, analysis,    This model focuses on content strategies, provides a high-level
                     strategy,         overview of the benefits, roles, activities, and outcomes
                 classification,        associated with strategy content. Model Purpose: Web
                  structuring,     consulting, design, and industry development describes processes
                 create, view,      and methodologies applied to all types of content: text, images,
                   re-viewing,                           video, and audio [21].
                 final viewing,
                    approval,
                      testing,
                   formatting,
                   publishing,
                    updating,
                    archiving.
   In some content lifecycle models (Table 15), project management concepts, information management,
information architecture, content strategies, Web site management, and semantic printing are provided
30-38]. Different authors suggest different stages of the content lifecycle [49-54]. The main steps (content
creation, development, viewing, distribution and archiving) are present in almost all proposed models
[55-64]. The lifecycle of processes, actions, content status, and content management role differ in models
depending on organizational strategies, needs, requirements, and capabilities [11-29].

Table 15
Content life cycle classification [19-29]
                                                  Development of information resources
                         Author             No
                                                  Formation Management Realization
                      McKeever S.           1        +/–           -            +/–
                    The State Victoria      2        +/–           -            +/–
                     Russell Nakano         3        +/–           -            +/–
                      Ann Rockley           4        +/–          +/–           +/–
                     Jo Ann Hackos          5        +/–           -            +/–
                      McGovern G.           6        +/–           -            +/–
                       Bob Boiko            7        +/–          +/–           +/–
                       Bob Doyle            8        +/–          +/–           +/–
                    CMP organization        9        +/–          +/–            -
                          AIIM              10       +/–          +/–           +/–
                      Woods Randy           11       +/–           +             +
                       Halverson            12        +           +/–           +/–

   Web Content Lifecycle Models 1-7 do not solve the problems of content creation and implementation,
and they do not solve all of the issues of managing a convention, for example:
    Submitting a plurality of content to an end-user according to their request, history or data portfolio;
    Generation of digests and user or content portraits;
    Automatic discovery of thematic subjects;
    Construction of tables of the interrelation of concepts;
    Calculation of ratings of terms;
    Collection of information from different sources and its formatting;
    Identification of keywords and concepts of content;
    Content categorization, identification of duplicate content, selectively distributing content.
   Models 8-10 successfully cope with content management issues and some content generation issues
but ignore content implementation issues. Models 11-12 solve content generation and content
management issues and partially address content implementation issues. Not all of these models support
Web 2.0-3.0 (Table 16) [66-75].

Table 16
Comparison of Web 1.0-2.0 parameters
  Name              Web 1.0                                   Web 2.0                     New properties
            User developer or content            User as co-developer, reader as co-       The right to
               creator and reader                         author or partner                 participate;
  Actor                                                                                cancellation of third
                                                                                         party regulatory
                                                                                        side (moderation)
              The software was created              Create software for the Web;        Web as a platform;
                for the PC; Software -             Software - service, application;    removal and erosion
 Software
                goods; closed source               open-source, API, open-source          of barriers and
              codes, ARI; licensed sale;           software; The software may be         restrictions (free
                binding of software to      free; software over the equipment;       access, versatility,
                 equipment; focus on           search for applications already        simplification).
                 invention; scheduled        invented; eternal beta; alternative
              release; use a browser to             means of perception.
                      view content.
              Database replenishment:         Database replenishment - having        Network as a single
               payment to the content             one becomes immediately             collective mind,
                   provider or hiring               accessible to everyone;               content
                       moderators;            the data is organized in a volatile       atomization,
             taxonomic organization of         manner; data usage tools - APIs;         aggregation,
                          data;                    automatic two-way links              syndication.
                hierarchy of headings;        submission form - blogs; dynamic
                data storage facilities -        site; the address has a trace
             catalogue, library, storage;     element of content; the source is
              one-way links submission      the collective mind; an interface for
 Content
                form - personal pages;       handling data across the network;
               static site; the site page    "Free" GNU FDL license; content is
             has an address; the source      not required to visit the site - read
             is the mind of the content                    RSS feeds.
              creator; menu navigation
              site to work with its data;
                copyright; to view the
               content, visit the site by
                  clicking on a link or
                        bookmark.
                Software ordering and       Collaboration through the Software         Cooperation;
             manufacturing; publication       Support Department; interacting,        amateur; single
                 of the content by the      adding properties, values, creating      mass relationships
             authors and their readers'            shared content with each
               perception; appeal to a        participant; self-service based on
  Events
             third party - a mediator to       the partner architecture of the
              use its resources; big, not         service, which is merely an
                       many deals.           intermediary between users using
                                                 their resources; small many
                                                    numerous transactions.
             Value in the software - the         Value in the database - the          Working with the
              software owner makes             database owner and services to         database; service,
  Value/
              money; The Internet is        work with them make money; The           not product; saving
   cost
              valuable as a source of               Internet is valuable as a        time and attention
                    information.                      communication tool.

   A well-known content management tool is the Content Management System (CMS), software for
organizing Websites or other Web resources or individual computer networks [1-9]. CMS must meet
certain requirements set (Fig. 8). Usually, such systems are used to store and publish a large amount of
content (documents, images, music, videos, etc.) [10-13]. Such CMSs allow you to manage text and
graphics content by providing users with convenient tools for storing and publishing information. In Fig.
8, b is a CMS classification [14-18]. CMSs do not support the entire content lifecycle and do not solve
the main problems of Web resource development - content generation and implementation. The main
drawback of CMS is that there is no link between the input, content, and output. CMS is often used for
the construction of SEC and ECCS (Table 17-20), such as online newspapers (Fig. 9, a) [14-18]. Web
Content management system, WCMS developed to generate content within portals with the same
problems (dynamic collection, caching content, security, etc.) and other Web applications [76-83]. The
value of the content determines its attractiveness to the consumer [84-99]. Content integration makes
portals attractive and application helpful integration. As users are increasingly drawn to portal
applications, there are more and more applications, including ECM. The WCMS admin panel allows you
to change/add new information for different language versions of the Web site [100-112]. Changes to the
site are displayed immediately after making and saving.




 a)                                               b)
Figure 8: a) Requirements and b) CMS classification




Figure 9: Classification of Internet newspapers


Table 17
The main differences between ECS and ECCS [30-38]
          Characteristic                      ECS                                 ECCS
          Type of goods                     Material                      Intangible (content).
         Volume of goods                   Decreases                           Constantly.
    Availability of a warehouse             Present                              Missing.
            Product DB                 Product description             Content and its description
            Promotion              By keywords in the product          By keywords in the content
                goods                      description                description and the content
                                                                                  itself
          Product search              By keywords in the product       By keywords in the content
                                             description              description and the content
                                                                                  itself
             Detection                            Manually                    Automatically
            duplication                                                    (programmatically),
              goods                                                  application of known methods
                                                                     of detection and elimination of
                                                                       duplication of information.
        Definition of ageing              Manually or on time                    Automatically
               goods                                                         (programmatically),
                                                                        application of known methods
                                                                        of research of information on
                                                                                     ageing
             Definition              Manually or by the number of                Automatically
             relevance                recent orders compared to              (programmatically),
               goods                   other charges or periods         application of known methods
                                                                         of information research for
                                                                                   relevance
             Analysis                     By orders, visits, and            On content orders and
           the audience               comments; a limited number           content, page views and
                                        of product attributes for                 comments
                                       analysis; comments do not
                                       capture the opinion of the
                                                audience
            Automatic                          Impossible;                For example, the automatic
            formation                 a short description is formed        generation of descriptions
              digest                            manually                  (digest, i.e. brief content) of
                                                                        articles in an online newspaper
            Automatic                          Impossible                    For example, it may be
            formation                                                      possible to generate a new
              goods                                                     article in an online newspaper
                                                                          from a trusted news source.
            Automatic                          Impossible                     Such as, for example,
            formatting                                                      automatic formatting of
              goods                                                     articles in an online newspaper
                                                                          according to audience class
                                                                        (age, gender, profession, etc.).
            Experience               It does not significantly affect   Significantly affects the level of
               user                  the increase in sales of goods          subscription of goods.

Table 18
Classification of Internet newspapers by type of articles created [113-119]
    Articles                                           Characteristic
   Actually                 Own journalists describe events, interview participants of events.
  generated
 Moderated Journalists/moderators independently search for material on the Internet, analyse and
                        organize the material received, write based on this material of the article.
  Legalized      Material for future articles looks for a module of the system by links or subscriptions,
                  moderators analyse and organize the material received, write based on this material
                                                       of the article.
  Combined                                 A combination of the first three types
   Filtered           Material for future articles searches for the module of the system by links or
                   subscriptions and filters according to the dictionaries contained in the module, and
                  moderators analyse and organize the material received, write based on this material
                                                       of the article.
   Aimed at          Filtered, but the formation of the article considers the level of user experience,
     user                        formed pieces primarily for users with more experience.
Table 19
Formal Content Management Models [9, 39-48]
    Name                                   Formal Content Management Model
                  C  A, B, T  . Internet space is divided into stable and dynamic components with
               different characters and joints regarding content flow management integration. The
                    regular Internet component contains "Long-lasting" content, and the active
                 ingredient has constantly updated resources. Some of this component then flows
               into the stable, the other part and to disappear or fall into the hidden Web-segment
               space is not available for additional users of my public information retrieval systems.
                The most dynamic segment of the content is news, which is also the highest level of
                 upgrades, and it generated and distributed large amounts of data. Therefore, it is
   Barton-           the best object of research. The processes of content ageing, the loss of its
    Kebler       relevance, are described by an equation of two components m  t   1  aeT  be2T ,
                 where m  t  is part of the helpful information in the total flow over time T , the first
                 denial corresponds to the stem and flax resources, and the second - dynamic (news).
                   Content dynamics in the network is conditioned with many factors that cannot be
                      accurately analysed. Within modelling, a reasonable assumption is the general
                         nature of the temporal dependence of the number of thematic publications
                        determined by simple laws. For more adequately support should refer to the
                                                            complex of about actually.
                    C  TF , IDF  . The model described by the equation C  TF * IDF where TF is the
                    local frequency Terms (Term Frequency, level of significance of terms within the
                 content), and IDF is the reciprocal frequency of the message throughout the stream
                   of content that E s tit this term (Inverse Document Frequency, level of uniqueness
                  Term throughout the content stream). The product of these values - a criterion for
                  determining the significance of what was the (weight). Content (messages, news) is
                 ageing, losing its relevance with an intensity determined by some empirical law. For
                 illustration, let's assume that it's exponential law. One of the suggested approaches
                    to that pare of generalization, such as message ranking, is the use of dependent
    Classic       parametric factors. For example, it is determined the weight of the message as the
 space-vector
                    product multiplication TF * IDF * et . Value  is some constant, t is the length of
                   time that has elapsed since the notification in the stream of content. Value  is a
                      factor n and the half-life relevance of content. If the expected use exponential
                    model is et  1 2 determined with expert route by which the message through
                     ageing loses its significance in half. Accounting for content ageing (loss of some
                   relevance) is of great importance in analytical studies, the creation of information
                 products (information portraits), the central storylines of events, and the ranking of
                    information retrieval systems. An approximate estimation of the rate of content
                               ageing is of practical value in determining the set of topical content.
                 C  Y , T , T0 ,V  . Management Dynamics thematic content (relevance/ageing) is done
                            linearly. The number of messages in the time t described by the formula
                   y  t   y  t0   v  t  t0  where y  t  is some notes at a time t , v is the average speed of
                    increase/decrease of content intensively in time (e.g., due to ageing). Content
                 component content quantitatively assessed as fluctuation (deviation from but he mi)
    Linear                   stream content. It is change the default critically departed
                                   i
                              1
                                  y t    y t   v t  t  . With change   t  process of changing the subject
                                                              2
                   ti                k      0     i   0
                              i
                                  k 0

                    content is a process independent of magnification (do not include links to the
                 previous content).In case of standard deviation by time such as   t  t  , the bigger
                        (degree of connection between random events  1 2 ;1 ) the higher is the
                                   correlation between the current and previous content.
                     C  N , T0 , T ,   . The process of increasing the relevance/ageing of content is

                 described by dependency N t   N t0  e t t0  , where  is the average relative change
                   in the intensity of the content stream. With a shift in power at a specific time
                     ti    N  ti   N  ti 1   / N  ti 1  . Change the value fluctuations   ti  about the mean
                                           i

 Exponential
                   options   ti   1
                                      i    t    . When changing   t  as a square root of time, the
                                          k 0
                                                 k
                                                      2



                 process is independent increases (correlation between individual and m content is
                insignificant). A significant amount of dependent content is valid   t  t  within the
                    range  1 2 ;1 , which indicates the presence of long-term system memory. Such
                   systems make class-similar processes taking into account correlations between
                                                 content at different times.
                       C  N , T , M  . Generators of content in most operating in a steady-state
                  characterized by maximum content space capacity N (the dimensionality of the
                 parameters and their measurement are not taken into account). Each organization
                  generator generates a stream of content on average constant for the number of
                   signs and messages of Laziness. Over time, only the volume of notes on a topic
   Logistic      changes. Increased number one topic content accompanied in decline in the range
                                                               T M
                  of another issue because T we
                                                                n t  dt  NT were the amount of content per
                                                               0 i 1
                                                                        i


                  unit of time and the total number of all the possible problems. The part is ni  t 
                                                    always 0.
                                                                             w
                 C  W , D  . Weight content is defined as WD  wD             where WD is weight content w is
                                                                              D

                  weight keyword content (it is a monotonically increasing function of n ) D is the
  Analytical
                   number of keywords in the content ( 1  D  12 ). Average weight University and
                   locally keyword are w  n   n / v  n   n1  / K where n is the total number of words
                                      stream K is the number of unique words.

Table 20
CMS components [9, 39-48]
    Model                           Advantage                                                 Drawback
  R.E. Burton  Describes the ageing process of content, the                         It isn't peculiar in terms of
   and R.W.       loss of its relevance. The equation of the                      interpretation of the results. It
    Kebler    model has an exact solution in an elementary                      grows monotonically and does not
                 and convenient function - exponents. It is                      describe the processes that must
                 determining the speed of development of                           have local extremes by their
                               individual thematic.                                            nature.
   Spatially-  Defining a meaningful term across the entire                     Mandatory ' these patterns ranking
     vector     content stream. Ability to identify the most                    content using pairs of parametrical
               up-to-date content from the many available                       multipliers that depend on the time
                                       ones
     Linear        Determining the intensity of a thematic                           They are applied with linear
               content stream over time (e.g., as a result of                       dynamics control of thematic
                                      ageing)                                                  content.
  Exponential      Describes the ageing process of content, the       There is no correlation between
                                loss of its relevance.                  unique content and content.
    Logistic      It combines the relative simplicity of problem    Study the dynamics of only a single
                      formulation with the ability to vary the      thematic flow. The dimensionality
                  solution using a set of parameters with more          of the parameters and their
                       or less transparent physical content.           measurement is not taken into
                                                                                  account.
   Analytical     Describes the ageing process of content, the      Mandatory ' compulsory presence
                              loss of its relevance.                       dictionary of keywords

    Using a CMS does not require installing special software in the workplace. They use a regular browser
(Google Chrome, Internet Explorer or Opera) for editing and administration. The intuitive interface and
ease of use of the system make it easier to manage the site and reduce the further costs of maintaining the
Web resource. To work with the design, you need only have basic Internet skills. The most popular CMS
is Drupal and Joomla! When considering the content item dynamics at current content in the county
limited models (Table 19-20) that paves the way for further research [1-18]. Content management models
are designed to determine the ageing/relevance of content flow. They do not solve the problems of content
creation, implementation, and they do not solve all content management problems:
    Submission of a plurality of content to the end-user according to his / her request, history or
        portfolio;
    Formation of digests; automatic information portraits;
    Automatic detection of thematic subjects;
    Automatic construction of tables of the interrelation of concepts;
    Calculation of concept ratings;
    Automatic collection of information from various sources;
    Automatic formatting of information;
    Automatic detection of keywords;
    Automatic content categorization;
    Duplicate detection and selective dissemination of content;
    Attract potential users.
   Fig. 8 is a graphical diagram of a typical regional information resource developed by CMS Joomla!
Apply method and online marketing for the analysis of Web resources in the region. Fig. 10 shows IDF0
diagram of a typical regional information resource.




Figure 10: Context diagram of a typical regional information resource

3.2.    The most effective methods of attracting potential customers
   Forms on the information resources of some advertiser-friendly are due to both. They have the right
to send their contact details and additional information about the products/services of the advertiser.
Persons who have provided information through such forms on an advertiser's information resource are
potential customers. Analysing this data and using it effectively helps build a profile for your possible
audience. To do this, you must use the following methods.
    1. Optimize your AdWords campaigns. After clicking on the ad, visitors expect to take some action
on the landing page. The visitor must have the right idea of what he can expect before clicking on an
advertisement. For this optimization campaign AdWords, will establish rates for the required keywords
if necessary using negative keywords (search terms reports analysis), uses UT accurate yet descriptive
and engaging ad text and set up conversion tracking. Tracking the landing page bounce rate and
conversion rate and comparing them to different variations of ad text that drives traffic to the page can
help you determine how well your ad was performing (Fig. 11).




Figure 11: IDF0 diagram of a typical regional information resource

    2. Landing page optimization. When a visitor lands on a landing page, their expectations must be
met or exceeded. Goal pages will upload fast; transitions between them should be convenient and satisfy
you with Google's landing page. To expand the client base with the use of forms, landing pages have to
be done very simply and understandable. Visitors landing page may feel uncomfortable providing their
information if they think the site is trustworthy. Reducing the amount of information a visitor needs to
enter and solely requesting the information they need to continue communicating with the visitor will
increase the likelihood of completing the form. If a visitor starts filling in your paper but then decides to
leave before submitting (such as the form is too long), the program Web - analysts register it as a rejection.
    3. Involvement of interested clients. Not every potential customer who fills in the form will become
a real customer. There may be several reasons: the landing page is not clear; the record does not confirm
the information provided; a unique program that scans sites and distributes spam and more automatically
fills the form. Google cannot control user behaviour on the site. In addition to optimizing your AdWords
campaign and landing page, there are several other ways to prevent bogus customers from registering on
your site.
    1. Add word verification.
    2. Enable auto-tagging in AdWords. To URL-address of the target page linked the GCLID parameter
for defined spare revision of the page because of clicking on an ad.
    3. Registration of applications. Each time a visitor submits a form, you can log their IP address,
GCLID parameter (if available), referrer URL, and user agent. Based on this data, you can determine if
there is traffic from ad clicks and whether there is suspicious activity. When questionable first asset of art
and visitors coming to your site via AdWords can resend to Google GCLID options or the visitor's IP
address. Google's Advertising Traffic Quality team will check your account.

3.3.    View your Google Analytics data in AdWords reports

   By looking at Google Analytics site engagement statistics along with AdWords performance data, you
can find out what users do after they click on your ads and land on a landing page. These statistics
submitted the following information.
    % New Sessions is the approximate percentage of first-time user visits.
      Pages / Session is the average number of pages viewed per session.
      Average Session Duration is the average amount of time a user stayed on the site.
      Bounce Rate. If a site visitor has viewed only one page or triggered only one event, Analytics
       counts it as an opt-out. Bounce Rate is the percentage of sessions that are interrupted.
   This content shows how effective the content is on the content resource and helps you decide on
optimising your budget, bids, landing pages, and ad text. For example, by comparing the bounce rate and
CTR for the content group (Fig. 12), you can get an idea of how well the site meets the users' expectations
involved in the ads.




Figure 12: IDF0 diagram of Content Search Ads

   For example, in Table 21 that the Topic 1 ad group has not only a higher CTR (8%) compared to the
similar Topic 2 ad group (6%) but also a higher bounce rate (60%).

Table 21
An example of analyzing content ad groups on an information resource
  Ad group topics CTR Impressions Bounce Rate Ad clicks Users who remain on the site
      Theme 1        8%       1000           60%           80        32
      Theme 2        6%       1000           30%           60        42

   The means that more than half of the users who visited the site after clicking ads in topic group 1 did
not stay there to view the offers or make a purchase in more detail. Even though ad group topic 2 receives
fewer clicks, the return on investment in them is higher because users involved in this advertising are
more likely to linger on a typical regional information resource (Fig. 13).




Figure 13: IDF3 diagram of a typical regional information resource
3.4.    Analysis of indicators of refusal to visit the information resource
   Bounce Rate is the percentage of visitors who view only one page when they visit your site. There are
reasons number why there may be a high failure rate (Fig. 14) [120-124].




Figure 14: Examples of bounce rates

   For example, visitors may leave the site on the sign-in page because of the site design or usability
issues. Alternatively, it may be that only certain pages on the site have a high bounce rate for excellent
reasons. Here are some of the problems that can cause a high bounce rate: To understand the difference
between an Exit Rate and a Bounce Rate for a specific site page, you should consider these three aspects
[120-124].
    For all page-views, the exit metric is the percentage of recent views per session.
    For all sessions initiated from a page, the bounce rate is the percentage of visits per session.
    The bounce rate for the page is calculated based only on the hits that started from that page
   Consider this last aspect in a simple example. The site has pages A through C. There is only one session
per day with the page view below [120-124].



    The Content Report for Page A will show you three page views and a bounce rate of 50%. The bounce
rate will not be 33% because Thursday's page-view A is not considered in the bounce rate calculation. A
speech is a session in which there is only one interaction with the visitor. The bounce rate for a page is
only relevant when a session starts from this page. Now let's examine the performance and failure rates
for a group of days with one session on the site [120-124].




   Below are the calculated percentages of outputs and failures [120-124]. Output metric:



   Bounce Rate:
3.5.    Goal Conversion Rate

    For chosen objective i , where i  1,20 , this figure represents the percentage of visits that resulted in a
conversion (this goal). Transformation occurs when a visitor reaches a destination. There are three types
of plans [120-124]:
     The destination URL is the page that visitors see immediately after the action is completed. To
        sign up for an account, thank you for registering or thank you for your purchase page or a receipt
        page. This goal initiates a conversion when a visitor views the specified page.
     Site Time is the time limit you specify for a site moderator. When a visitor spends more or less
        time on a site than a specific time limit, a conversion is made.
     The number of pages viewed per visit allows you to determine the page-view threshold. When a
        visitor views more or fewer pages than the limit, the conversion is completed.
    Goals and Funnels is a versatile way to determine the success of an information resource or program
based on your goals. The funnel can be used to specify the expected traffic path to reach a goal. The
combination of goals and funnels allows you to analyse how effectively a site or program is driving users
toward the goal. Each time a user action meets a goal, a conversion is recorded in Google Analytics. If
you set a goal value in monetary terms, your conversion data will also contain the corresponding values.
Goals with Goal Completions (i.e. Goal Completions Levels) can be viewed in Goal reports. You can
also analyse goal completion conversions with other messages, including visitor reports, traffic, Site
Search reports, and event reports [120-124].
    There are four types of targets to choose. When a visitor completes a selected action, a conversion is
triggered and recorded in goal reports. You can choose the type of tracking goal you want from the list
when setting up goals in your account [120-124].
     Destination URL: The address of a specific placement, such as a web page (or virtual page) or
        application screen that has been downloaded. Thus, a webpage or screen of a sign-up application
        can be a destination for an e-commerce campaign to identify potential customers. This goal goes
        well with the sequences.
     Visit Duration: Visits that last for a fixed time or longer. You can use this goal to determine the
        number of visitors who stay on the page or purchase screen for more than 2 minutes.
     Pages / Visits (For Web Pages) Screens / Visits (For Applications): A visitor views a certain
        number of pages or screens during a session. Uses UT this type of goal when you want to capture
        visitors who see, for example, less than three pages.
     Event: The visitor triggers an action that the moderator defines as an event (such as a social
        recommendation or an ad click). You must first set up Event Tracking before setting up a Goal of
        this type.
    Goals are automatically grouped in sets, but the moderator determines which plans should belong to
each location. Uses UT sets to categorize the different types of goals for the site. You can track downloads,
signups, and receipt pages in separate goal sets. Goals are set at the profile level (up to 20 in a single
profile). Each profile can create four groups with a maximum of five goals. To track more than 20 goals
for a website or program, create a new profile for that property [120-124].
    When setting goals conversion value of a dollar, each time the goal is reached, that number will be
logged. Then, all cases of the registered number will be added and displayed as Goal Cost. Any action
taken by a user on a website or program can be carried over in dollars. One way to determine the value
of a goal is to calculate how often customers who have reached a goal become customers. If the sales
team is addressed by 10% of subscribers to newsletters, and the average transaction amount is 500, then
the cost of a subscription to newsletters can be set at 50 (i.e. 10% of 500). Visitors reach their goals when
they go to the last sign-up page. However, if only 1% of all subscribers make a purchase, then the cost of
the Newsletter subscription can only be assigned a value of five. Although it is unnecessary to set prices
when setting goals, they use this option to estimate weight and profit from any visitor interaction with the
site. System Google Analytics also uses the Goal Value data to calculate other indicators such as return
on investment (ROI) and average. You can use the funnel to specify the expected traffic path to reach
your destination. Focusing on the steps of the funnel fixed by the moderator, Analytics tracks the times
when visitors come and leave the goal. This WMS to obtain valuable information about the site. For
example, you could identify a page in a funnel that captures many exits on the way to a goal, indicating
problems with that page. If there are many missed steps, this will display difficult navigation or too many
conversion paths with many unnecessary steps. Funnels can only use in conjunction with a destination.
The last page in the funnel is a goal page (entered as a goal), while the previous pages form a funnel. If
the goal of the funnel is to attract leads, then the first page of the funnel can be assigned the URL of the
contact request form, and the landing page is the URL for the thank you page for the request that is
displayed after the user requests the contact [120-124].

3.6.    Calculation of indicators
    1. "Compared to homepage" metric. This metric compares the conversion rates of the experiment
        page and the original page [120-124].
   The following formula makes the comparison:
                           рейтинг конверсій експериментального варіанта 
                                                                        1  100 .
                              рейтинг конверсій початкового варіанта        
   For example, if case Variation effective than the original:
    Experiment Conversion Rate = 35%
    Initial conversion rate = 25%
                                                        35 
   Then, value index n is compared to your original        1  100  40 %.
                                                        25 
   If the experimental variant is less effective than the original variant:
    Experiment Conversion Rate = 20%
    Initial conversion rate = 40%
                                                  20 
   Metric value Compared to % original page          1  100  50 .
                                                  40 
    The assist-to-recent conversions ratio results are from dividing the number of conversions. If a channel
has repeatedly played an ancillary role on the path to one conversion, only one conversion is counted as
an associate conversion for the metric. Associated conversions for different channels do not exclude each
other. Associated conversion is taken into account for all channels that have an ancillary role in one
conversion path [120-124].
    To view a subset of conversion funnels, you need to apply conversion segments instead of filters with
filters. Using a filter profile can adversely affect the accuracy of Multi-Channel Funnels reports. Using
means the creation of conditions to specify the conversion paths to be included in the segment. For
example, to set up a conversion segment that contains only conversion courses that begin with
example.com, you must specify the following [120-124].
    An Attribution Model is a rule or set of rules that defines how credits for sales and conversions are
assigned to touchpoints with audiences in the path to conversions. For example, the Last Engagement
attribute gives 100% credit to endpoints with audiences (i.e., clicks) that precede sales or conversions.
The First Engagement attribute assigns 100% credit to the audience touchpoints that begin the path to
conversions. Below is an example of attribution models. The calculated conversion value (and the number
of modifications) for each marketing channel will vary according to the attribution model. A track that is
mostly starting to drive conversions will have a higher conversion value than the Last Interaction
attribution model, thanks to its attributive First Interaction model. A customer found the site by clicking
on one of the paid ads. He returns in a week via a social network. On the same day, he produced a third
time to get the goods - this time for one campaign through email. In the Attribution Model:
     Last Interaction last touchpoint - in this case, channel email - receive 100% credit for the sale.
     First Engagement, The first point of contact with your audience, is the paid ad channel - will get
         100% credit for the sale.
       Linear every touchpoint on the path to conversion - in this case, the Paid Advertising channel,
        social network feeds and email - share equal credit (33.3% each) credit for the sale.
     Over time, audience touchpoints that are closest in time to sales or conversions get the most credit.
        In this case, email and social network channels will receive most of the credit because the customer
        interacted with them on the conversion day. Since engagement with a paid ad occurred a week
        earlier, this channel will receive much less recognition.
     Based on the position, 40% of the credit is assigned to the first interaction, 20% to intermediate
        interactions, and 40% to the last interaction. Feeds paid ad and email receives 40% credit, and
        social network - 20%.
    Attribution Modelling lets you compare the impact of different attribution models on evaluating
marketing channels. In the tool, select an attribution model (such as Last Interaction). Then the table will
show the number of conversions (or, depending on your choice, the cost) for each channel calculated by
the model you selected. You can select up to three attribution models at a time and compare the results of
each one in the table. After importing cost data into AdWords or other similar information, columns will
appear to help you analyse and compare the metrics. In addition to basic models, you can use attribution
modelling to create, save, and apply a custom model that uses the rules specified by the moderator. It
allows you to tailor the models specifically to the set of assumptions that need to estimate in the
conversion path data. In the "Applying Special Credit Rules" section, you can specify conditions that
determine touch points on the conversion path based on characteristics such as position (first, last,
average, assist), touchpoint type (click, impression, direct visit), and also the type of campaign or traffic
source (campaign, keyword, or other dimensions). After defining the touchpoints you want, you can
specify how you would allocate the conversion credit for those points to other points [120-124].
    All the rules is determined by the relative distribution of loans. For example, a linear model splits the
conversion credit equally between touchpoints. Therefore, on the way to a four-conversion conversion,
each touchpoint will receive 25% credit. However, if a paid ad channel is credited with 2 points and the
third point on the path is "Paid Ads" [120-124], the credit will be applied as follows, as shown in Fig. 15.




Figure 15: Paid Ads Example

    After applying multiple rules to a single point of contact, the weight of the credit rules overlap will
multiply. The Last Interaction Model transfers 100% of the conversion price to the last channel that the
user interacted with before purchasing or completing the conversion. Google Analytics uses this default
model to pass conversion costs into reports that are not multi-channel funnels. Because the Last
Interaction model is the default model for messages that do not relate to multi-channel funnels, it provides
valuable results compared to other models. Also, suppose ads and campaigns are designed to attract
people at the time of purchase or are primarily engaged in transactions and have sales cycles that do not
reflect phase. In that case, the Last Interaction model may be acceptable [120-124].
    The First Interaction Model transfers 100% of the conversion cost to the first channel, with the user
interacted. This model is acceptable if you are running ads or campaigns to create initial awareness. For
example, if a brand is poorly known, you can focus on the keywords or channels that are the first to
represent the brand to the customer [120-124].
    Model Line distributes equal credit to each channel interaction on the conversion path. The model is
helpful if campaigns are designed to keep in touch with the customer and keep him informed throughout
the sales cycle. In this case, each point is vital for the reflection process. If the sales cycle involves a brief
reflection phase, you can use the Impairment Model over time. This model transfers most of the credit to
the touchpoints that occurred in time closest to the conversion. If you run one- or two-day advertising
campaigns, you can give more credibility to your interactions during the advertising days. In this case,
the interactions that occurred a week before the promotion would receive only a tiny fraction of the credit
compared to the touchpoints near the conversion. Over time, the Attenuation model appropriately credits
touch points during the one or two days leading up to a conversion [120-124].

4. Experiments, results and discussion
    Fig. 16 shows a contextual diagram of data flows of a typical regional information resource, and Fig.
17 shows a detailed flow chart of a specific regional information resource. Model Position-based allows
you to combine the Last Interaction and First Interaction models. Instead of giving all the credit to the
first or last interaction, it can split between them. Typically, 40% of the credit is assigned to first and last
interactions, and 20% is to intermediate interactions. If they value more points of contact, which
introduced a user's brand and points that led to the sale, uses a model based on the position. Fig. 18 shows
an ERD of a typical regional information resource.




Figure 16: Contextual DFD is a typical regional information resource




Figure 17: A detailed DFD of a typical regional information resource
Figure 18: An ERD of a typical regional information resource

   Mathematical relation for deterministic systems in the general case [125-136]:
                                                                             y1 
                                      dy                                     
                                          f  y, t  , y  t0   y0 , y    .
                                      dt                                    y 
                                                                             n
   For the site of the Lviv city of consider the model administrator-visitor [125-136]:




where y1 is the number of administrators, y2 is the number of visitors, Cavg is the amount of content, Call
is the total amount of content, ALL is useful information determined scale from 0 to 1.
    The managed system based on Lotka-Volterra equations, also known as the predator-prey equations,
looks like [125-136]:




   Linearization of function:




  Discrete-deterministic model of information system. To implement this system, you can use 1 of 2
machines: the Mealy or Moore machine [125-136].
                                                                    z  t  1    z  t  , x  t  , t  0,1, 2,...;
   Type 1: Mealy Machine (Fig. 19-20, Table 22-23): 
                                                                     y  t     z  t  , x  t   , t  0,1, 2,...;
                               z  t  1    z  t  , x  t  , t  0,1, 2,...;
   Type 2: Moore machine: 
                                y  t     z  t  1 , x  t   , t  0,1, 2,...;
                                            y  t     z  t   , t  0,1, 2,...;




Figure 19: Mealy Machine Example, where Z 0 is request to the server, Z1 is the processing of the
request, Z 2 is running of the script, Z 3 is the connection to the database, Z 4 is generation and delivery
of the page to the visitor.




Figure 20: Discrete-stochastic model of information system example

Table 22
Mealy Machine Example
                                       Xi                  Zk
                                             Z0    Z1      Z2  Z3   Z4
                                      Transitions between system states
                                       X1    Z1     -       -   -    -
                                       X2     -    Z2       -   -    -
                                       X3     -     -      Z2   -    -
                                       X4     -     -       -  Z3    -
                                       X5     -     -       -   -   Z4
                                                      Exits
                                       X1    Y1     -       -   -    -
                                       X2     -    Y2       -   -    -
                                       X3     -     -      Y2   -    -
                                       X4     -     -       -  Y3    –
                                       X5     -     -       -   -   Y4

Table 23
Discrete-stochastic model of information system
                                       Z0 Z1 Z2 Z3 Z4
                                        1 0     0  0 0
                                        0 0.8 1    0 0
                                        0 0 0.4 0 0
                                        0 0     0 0.5 1
                                        0 0     0  0 0

    Continuous-stochastic model of information system. Every day new articles and new information
are added to the database. Therefore, there is nothing in the drive at the beginning of the day. Thus, the
states of the subsystem will be described by the system of equations [125-136]:
                     Pn  t  t   Pn  t  1       t   Pn1  t   t  Pn1  t   t , n  1,
                     
                      P0  t  t   P0  t 1   t   P1  t   t ,
where Pn  t  is the probability of the system being in a state, zn  t   Z at time t, that is, n applications,
we differentiate a system if it has n applications [125-136]:
                                  dPn  t 
                                                      Pn  t    Pn1  t    Pn1  t 
                                             dt
                                  
                                  dP0  t    P  t    P  t 
                                            dt        0           1

  When equating time to zero [125-135]:
                           pn   pn1   pn1, n  1,    1    pn  pn1   pn1, n  1,
                                                                  
                        p0   p0 ,                              p1   p0 .
                                                                   
when P1  1 : pn   n 1   
  The mathematical expectation of the amount of content in the system [125-136]:
                                                                      
                                    ln   npn  1     n n   1   
                                          n 0                     n 0
   Average stay:
                                                              
                                                                   2
                                                     l
                                                 lH  n
                                                          1   
                                                          
   Network model. With the help of the network model, I will build the principle of CMS work for the
project (Fig. 21). To begin with, a user has requested a server [125-136]:




Figure 21: Network model example

  Then the server transmits data to the script handler, the script itself to routing, and routing to
modularity (Fig. 22). There is the module search, GET query template.




Figure 22: Network model example
   After routing, the script selects the module type (content, directory, search) shown in Fig. 23.




Figure 23: Network model example

   The content type, module template, system module options, content and module itself are downloaded
(Fig. 24). The server outputs the generated page to the user in the browser.




Figure 24: Network model example

   Combined model. Fig. 25 shows Aggregation system [125-136], where А1 is server, А2 is CMS of
our project, А3 is DB and
   1 is a server request.
   2 is the connection to the database.
   3 is errors.
   4 is giving the client a generated page, shutting down.
   5 is data transmission via POST, GET, HEAD method.
   6 is data acquisition by POST, GET, HEAD.
   7 is delivery of content by criteria.




Figure 25: Aggregation system Example
5. Conclusions
    1. The analysis of ways of forming commercial content is carried out. The known models of a life
       cycle of content and the standardized services of management of content give the chance to define
       requirements for creating an optimum life cycle of commercial content.
    2. Internet technologies for the construction of service-oriented e-commerce systems are studied,
       making it possible to classify e-commerce systems and e-content commerce systems.
    3. Information resources and production processes of e-commerce systems are considered in detail,
       making it possible to develop an optimal content life cycle and a typical architecture of e-
       commerce systems.
    4. The technology of content management in e-commerce is analyzed, allowing the development of
       formal models, unified methods and software tools for processing information resources in e-
       content commerce systems.
    5. From the standpoint of a systematic approach, an analysis of modern methods and tools for
       designing, modelling, and implementing electronic content commerce systems and substantiated
       the need and feasibility of creating unified procedures and software for processing information
       resources.

6. References
[1] V. Vysotska, R. Hasko, V. Kuchkovskiy, Process analysis in electronic content commerce system,
     in: Proceedings of the International Conference on Computer Sciences and Information
     Technologies, CSIT, 2015, pp. 120-123.
[2] J. Su, V. Vysotska, A. Sachenko, V. Lytvyn, Y. Burov, Information resources processing using
     linguistic analysis of textual content, in: Proceedings of the International Conference on Intelligent
     Data Acquisition and Advanced Computing Systems Technology and Applications, Romania, 2017,
     pp. 573-578.
[3] V. Lytvyn, V. Vysotska, Designing architecture of electronic content commerce system, in:
     Proceedings of the International Conference on Computer Sciences and Information Technologies,
     CSIT, 2015, pp. 115-119.
[4] V. Vysotska, V.B. Fernandes, M. Emmerich, Web content support method in electronic business
     systems, volume Vol-2136 of CEUR Workshop Proceedings, 2018, pp. 20-41.
[5] V. Vysotska, L. Chyrun, L. Chyrun, Information Technology of Processing Information Resources
     in Electronic Content Commerce Systems, in: Proceedings of the International Conference on
     Computer Sciences and Information Technologies, CSIT, 2016, pp. 212-222.
[6] B. Rusyn, V. Vysotska, L. Pohreliuk, Model and architecture for virtual library information system,
     in: Proceedings of the International Conference on Computer Sciences and Information
     Technologies, CSIT, 2018, pp. 37-41.
[7] Y. Matseliukh, V. Vysotska, M. Bublyk, T. Kopach, O. Korolenko, Network Modelling of Resource
     Consumption Intensities in Human Capital Management in Digital Business Enterprises by the
     Critical Path Method, volume Vol-2851 of CEUR Workshop Proceedings, 2021, pp. 366-380.
[8] V. Vysotska, Y. Burov, V. Lytvyn, O. Oleshek, Automated Monitoring of Changes in Web
     Resources, volume of 1020 Advances in Intelligent Systems and Computing, 2020, pp. 348-363.
[9] D. Lande, Basis of information flow integration, Handbook, Engineering, 2006.
[10] V. Vysotska, I. Rishnyak, L. Chyrun, Analysis and evaluation of risks in electronic commerce, in:
     Proceedings of the International Conference on CAD Systems in Microelectronics, 9th International
     Conference, 2007, pp. 332-333.
[11] G. Salton, Developments in automatic text retrieval, volume 253(5023) of science, 1991, pp. 974-
     980.
[12] G. Salton, D. Harman, Information retrieval, in: Encyclopedia of computer science, 2003, pp. 858-
     863.
[13] R. Papka, On-line News Event Detection, Clustering, and Tracking. Amherst, Massachusetts
     University, 1999.
[14] Metatorial Services, Inc., The Content Management Possibilities Poster. URL:
     http://metatorial.com/pagea.asp?id=poster.
[15] EMC, IBM, Microsoft. Content Management Interoperability Services. Part II – SOAP protocol
     binding. Version 0.5. Hopkinton, 2008.
[16] EMC, IBM, Microsoft. Content Management Interoperability Services. Part II – REST protocol
     binding. Version 0.5. Hopkinton, 2008.
[17] EMC, IBM, Microsoft. Content Management Interoperability Services. Part I. Version 0.5.
     Hopkinton, 2008.
[18] EMC, IBM, Microsoft. Content Management Interoperability Services. Appendices. Version 0.5.
     Hopkinton, 2008.
[19] B. Boiko, Content management bible. John Wiley & Sons, 2005.
[20] J. Hackos, Content Management for Dynamic Web Delivery. Hoboken, Wiley, 2002.
[21] K. Halverson, Content Strategy for the Web. Reading, New Riders Press, 2009.
[22] G. McGovern, R. Norton, Content Critical. Upper Saddle River, FT Press, 2001.
[23] S. McKeever, Understanding Web content management systems: evolution, lifecycle and market,
     volume 103 (9) of Industrial Management & Data Systems (MCB UP), 2003, pp. 686-692.
[24] R. Nakano, Web content management: a collaborative approach. Boston, Addison Wesley
     Professional, 2002.
[25] R.        Woods,       Defining       a      Model        for       Content,      2010.       URL:
     www.contentmanager.net/magazine/article_785_defining_a_model_for_ content_governance.html.
[26] A. Rockley, Managing Enterprise Content: A Unified Content Strategy. Reading, New Riders Press,
     2002.
[27] W.R. Stone, Plagiarism, Duplicate Publication and Duplicate Submission: They Are All Wrong!,
     volume 45(4) of IEEE Antennas and Propagation, 2003, pp. 47-49.
[28] D. Sullivan, Invisible Web Gets Deeper. Search Engine Report, 2002. URL:
     http://searchenginewatch.com/sereport/article.php/2162871.
[29] CMP, CM Lifecycle Poster. URL: http://www.cmprosold.org/resources/poster/.
[30] C. Osgood, The nature and measurement of meaning, volume 49 of Psychological Bulletin, 1952,
     pp. 197-237.
[31] O. Kanishcheva, V. Vysotska, L. Chyrun, A. Gozhyj, Method of Integration and Content
     Management of the Information Resources Network, volume 689 of Advances in Intelligent Systems
     and Computing, 2018, Springer, pp. 204-216.
[32] A. Gozhyj, V. Vysotska, I. Yevseyeva, I. Kalinina, V. Gozhyj, Web Resources Management Method
     Based on Intelligent Technologies, volume 871 of Advances in Intelligent Systems and Computing,
     2019, pp. 206-221.
[33] A. Gozhyj, I. Kalinina, V. Vysotska, V. Gozhyj, The method of web-resources management under
     conditions of uncertainty based on fuzzy logic, in: Proceedings of the International Conference on
     Computer Sciences and Information Technologies, CSIT, 2018, pp. 343-346.
[34] C. R. Rao, V. N. Gudivada, Computational analysis and understanding of natural languages:
     Principles, methods and applications. Elsevier, 2018.
[35] P.J. Hayes, S.P. Weinstein, Construe/TIS: A system for content-based indexing of a database of news
     stories, volume 2 of Innovative Applications of Artificial Intelligence, The AAAI Press/The MIT
     Press, Cambridge, MA, 1991, pp. 49-64.
[36] O. Naum, L. Chyrun, O. Kanishcheva, V. Vysotska, Intellectual System Design for Content
     Formation, in: Proceedings of the International Conference on Computer Sciences and Information
     Technologies, CSIT, 2017, pp. 131-138.
[37] B. Rusyn, V. Lytvyn, V. Vysotska, M. Emmerich, L. Pohreliuk, The Virtual Library System Design
     and Development, volume 871 of Advances in Intelligent Systems and Computing, 2019, pp. 328-
     349.
[38] V. Lytvyn, V. Vysotska, Y. Burov, O. Veres, I. Rishnyak, The Contextual Search Method Based on
     Domain Thesaurus, volume 689 of Advances in Intelligent Systems and Computing, 2018, pp. 310-
     319.
[39] D. Lande, O. Dmytrenko, O. Radziievska, Subject Domain Models of Jurisprudence According to
     Google Scholar Scientometrics Data, volume Vol-2604 of CEUR workshop proceedings, 2020, pp.
     32-43.
[40] A. Boychenko, D. Lande, Generation of Information Impacts Scenarios in Management Decision
     Support Systems, in: International scientific-practical conference, Springer, 2020, pp. 175-185.
[41] D. Lande, I. Subach, A. Puchkov, A System for Analysis of Big Data from Social Media, volume
     47(1) of Information & Security, 2020, pp. 44-61.
[42] M. Zgurovsky, A. Boldak, D. Lande, K. Yefremov, M. Perestyuk, Predictive Online Analysis of
     Social Transformations based on the Assessment of Dissimilarities between Government Actions
     and Society’s Expectations, in: IEEE 2nd International Conference on System Analysis & Intelligent
     Computing, SAIC, 2020, pp. 1-6.
[43] D. Lande, M. Fu, W. Guo, I. Balagura, I. Gorbov, H. Yang, Link prediction of scientific collaboration
     networks based on information retrieval, in: World Wide Web, 2020, pp. 1-19.
[44] N., Kunanets, Y., Oliinyk, D., Kobylynskyi, A., Rzheuskyi, K., Shunevich, V. Tomashevskyi, The
     Model" Information Gatekeepers" for Sentiment Analysis of Text Data, in: ICTERI, 2019, pp. 164-
     177.
[45] M. Fu, H. Yang, J. Feng, W. Guo, Z. Le, D. Lande, D. Manko, Preferential information dynamics
     model for online social networks, volume 506 of Physica A: Statistical Mechanics and its
     Applications, 2018, pp. 993-1005.
[46] M. Fu, J. Feng, D. Lande, O. Dmytrenko, D. Manko, R. Prakapovich, Dynamic model with super
     spreaders and lurker users for preferential information propagation analysis, volume 561 of Physica
     A: Statistical Mechanics and its Applications, 2021, p. 125266.
[47] D. Lande, V. Andrushchenko, I. Balagura, Data Science in Open-Access Research on-Line
     Resources, in: IEEE Second International Conference on Data Stream Mining & Processing, DSMP,
     2018, pp. 17-20.
[48] D. Lande, A. Snarskii, D. Manko, The Model of Words Cumulative Influence in a Text, in: XVIII
     International Conference on Data Science and Intelligent Analysis of Information, Springer, Cham,
     2018, pp. 249-256.
[49] V. Vysotska, L. Chyrun, Analysis features of information resources processing, in: Proceedings of
     the International Conference on Computer Sciences and Information Technologies, CSIT, 2015, pp.
     124-128.
[50] M. Korobchinsky, V. Vysotska, L. Chyrun, L. Chyrun, Peculiarities of Content Forming and
     Analysis in Internet Newspaper Covering Music News, in: Proceedings of the International
     Conference on Computer Sciences and Information Technologies, CSIT, 2017, pp. 52-57.
[51] V. Lytvyn, V. Vysotska, O. Veres, I. Rishnyak, H. Rishnyak, The Risk Management Modelling in
     Multi Project Environment, in: Proceedings of the International Conference on Computer Sciences
     and Information Technologies, CSIT, 2017, pp. 32-35.
[52] V. Vysotska, Linguistic Analysis of Textual Commercial Content for Information Resources
     Processing, in: Proceedings of the International Conference on Modern Problems of Radio
     Engineering, Telecommunications and Computer Science, TCSET, 2016, pp. 709-713.
[53] L. Vasyl, V. Victoria, D. Dmytro, H. Roman, R. Zoriana, Application of Sentence Parsing for
     Determining Keywords in Ukrainian Texts, in: Proceedings of the International Conference on
     Computer Sciences and Information Technologies, CSIT, 2017, pp. 326-331.
[54] P. Zdebskyi, V. Lytvyn, Y. Burov, Z. Rybchak, P. Kravets, O. Lozynska, R. Holoshchuk, S.
     Kubinska, A. Dmytriv, Intelligent System for Semantically Similar Sentences Identification and
     Generation Based on Machine Learning Methods, volume Vol-2604 of CEUR workshop
     proceedings, 2020, pp. 317-346.
[55] V. Andrunyk, L. Chyrun, V. Vysotska, Electronic content commerce system development, in:
     Proceedings of 13th International Conference: The Experience of Designing and Application of
     CAD Systems in Microelectronics, CADSM, 2015.
[56] L. Chyrun, Model of Adaptive Language Synthesis Based on Cosine Conversion Furies with the Use
     of Continuous Fractions, volume Vol-2604 of CEUR workshop proceedings, 2020, pp. 600-611.
[57] R. Bekesh, L. Chyrun, P. Kravets, A. Demchuk, Y. Matseliukh, T. Batiuk, I. Peleshchak, R. Bigun,
     I. Maiba, Structural Modeling of Technical Text Analysis and Synthesis Processes, volume Vol-
     2604 of CEUR workshop proceedings, 2020, pp. 562-589.
[58] K. Alieksieieva, A. Berko, V. Vysotska, Technology of commercial web-resource processing, in:
     Proceedings of 13th International Conference: The Experience of Designing and Application of
     CAD Systems in Microelectronics, CADSM, 2015.
[59] R. Perkhach, D. Kysil, D. Dosyn, I. Zavuschak, Y. Kis, M. Hrendus, A. Vasyliuk, M. Sadova, M.
     Prodanyuk, Method of Structural Semantic Analysis of Dental Terms in the Instructions for Medical
     Preparations, volume Vol-2604 of CEUR workshop proceedings, 2020, pp. 662-669.
[60] P. Kravets, V. Lytvyn, V. Vysotska, Y. Burov, I. Andrusyak, Game Task of Ontological Project
     Coverage, volume Vol-2851 of CEUR Workshop Proceedings, 2021, pp. 344-355.
[61] P. Kravets, Y. Burov, O. Oborska, V. Vysotska, L. Dzyubyk, V. Lytvyn, Stochastic Game Model of
     Data Clustering, volume Vol-2853 of CEUR Workshop Proceedings, 2021, pp. 214-227.
[62] M. Bublyk, V. Vysotska, L. Chyrun, V. Panasyuk, O. Brodyak, Assessing Security Risks Method in
     E-Commerce System for IT Portfolio Management, volume Vol-2853 of CEUR Workshop
     Proceedings, 2021, pp. 462-479.
[63] V. Lytvyn, V. Vysotska, V. Kuchkovskiy, I. Bobyk, O. Malanchuk, Y. Ryshkovets, I. Pelekh, O.
     Brodyak, V. Bobrivetc, V. Panasyuk, Development of the system to integrate and generate content
     considering the cryptocurrent needs of users, volume 1(2-97) of Eastern-European Journal of
     Enterprise Technologies, 2019, pp. 18-39.
[64] V. Vysotska, L. Chyrun, Methods of information resources processing in electronic content
     commerce systems, in: Proceedings of 13th International Conference: The Experience of Designing
     and Application of CAD Systems in Microelectronics, CADSM, 2015.
[65] A. Berko, V. Alieksieiev, A Method to Solve Uncertainty Problem for Big Data Sources, in:
     Proceedings of International Conference on Data Stream Mining and Processing, DSMP, 2018, pp.
     32-37.
[66] A.Y. Berko, K.A. Aliekseyeva, Quality evaluation of information resources in web-projects, volume
     136(10) of Actual Problems of Economics, 2012, pp. 226-234.
[67] A. Berko, Consolidated data models for electronic business systems, in: Proceedings of International
     Conference on The Experience of Designing and Application of CAD Systems in Microelectronics,
     CADSM, 2007, pp. 341-342.
[68] A.Y. Berko, Methods and models of data integration in E-business systems, volume of 10 Actual
     Problems of Economics, 2008, pp. 17-24.
[69] A.Y. Berko, Models of data integration in open information systems, volume 10 of Actual Problems
     of Economics, 2010, pp. 147-152.
[70] B. Rusyn, L. Pohreliuk, O. Kapshii, J. Varetskyy, A. Demchuk, I. Karpov, A. Gozhyj, V. Gozhyj, I.
     Kalinina, An Intelligent System for Commercial of Information Products Distribution Based SEO
     and Sitecore CMS, volume Vol-2604 of CEUR workshop proceedings, 2020, pp. 760-777.
[71] S. Makara, L. Chyrun, Y. Burov, Z. Rybchak, I. Peleshchak, R. Peleshchak, R. Holoshchuk, S.
     Kubinska, A. Dmytriv, An Intelligent System for Generating End-User Symptom Recommendations
     Based on Machine Learning Technology, volume Vol-2604 of CEUR workshop proceedings, 2020,
     pp. 844-883.
[72] A. Rzheuskyi, O. Kutyuk, O. Voloshyn, A. Kowalska-Styczen, V. Voloshyn, L. Chyrun, S. Chyrun,
     D. Peleshko, T. Rak, The Intellectual System Development of Distant Competencies Analyzing for
     IT Recruitment, volume 1080 of Advances in Intelligent Systems and Computing IV, Springer,
     Cham, 2020, pp. 696-720.
[73] M. Hrendus, V. Andrunyk, M. Yavir, Y. Ryshkovets, A. Khudyi, V. Hryhorovych, M.
     Korobchynskyi, Developing an Intelligent Online Learning System for Foreign Language
     Vocabulary Training Based on Gamification, volume Vol-2604 of CEUR workshop proceedings,
     2020, pp. 1075-1101.
[74] A. Bomba, M. Nazaruk, N. Kunanets, V. Pasichnyk, Modeling the Dynamics of Knowledge Potential
     of Agents in the Educational Social and Communication Environment, volume 1080 of Advances in
     Intelligent Systems and Computing IV, Springer Nature Switzerland AG, Springer, 2020, pp. 17-24.
[75] R. Kubik, Y. Ryshkovets, M. Hrendus, A. Khudyi, A. Vysotskyi, V. Hryhorovych, S. Chyrun,
     Development of an Intelligent System for Selecting Songs According to the User Needs, volume
     Vol-2604 of CEUR workshop proceedings, 2020, pp. 1251-1279.
[76] M. Bublyk, Y. Matseliukh, U. Motorniuk, M. Terebukh, Intelligent System of Passenger
     Transportation by Autopiloted Electric Buses in Smart City, volume Vol-2604 of CEUR workshop
     proceedings, 2020, pp. 1280-1294.
[77] V. Andrunyk, V. Pasichnyk, N. Antonyuk, T. Shestakevych, A Complex System for Teaching
     Students with Autism: The Concept of Analysis. Formation of IT Teaching Complex, volume 1080
     of Advances in Intelligent Systems and Computing IV, Springer Nature Switzerland AG, Springer,
     Cham, 2020, pp. 721-733.
[78] R. Holoshchuk, V. Pasichnyk, N. Kunanets, N. Veretennikova, Information Modeling of Dual
     Education in the Field of IT, volume 1080 of Advances in Intelligent Systems and Computing IV,
     Springer Nature Switzerland AG, Springer, Cham, 2020, pp. 637-646.
[79] N. Antonyuk, M. Medykovskyy, L. Chyrun, M. Dverii, O. Oborska, M. Krylyshyn, A. Vysotsky, N.
     Tsiura, O. Naum, Online Tourism System Development for Searching and Planning Trips with
     User’s Requirements, volume 1080 of Advances in Intelligent Systems and Computing IV, Springer
     Nature Switzerland AG, 2020, pp. 831-863.
[80] O. Veres, B. Rusyn, A. Sachenko, I. Rishnyak, Choosing the method of finding similar images in
     the resverse seach system, volume 2136 of CEUR Workshop Proceedings, 2018, pp. 99-107.
[81] Y. Varetskyy, B. Rusyn, A. Molga, A. Ignatovych, A new method of fingerprint key protection of
     grid credential, volume 84 of Advances in Intelligent and Soft Computing, 2010, pp. 99-103.
[82] L. Chyrun, A. Gozhyj, I. Yevseyeva, D. Dosyn, V. Tyhonov, M. Zakharchuk, Web Content
     Monitoring System Development, volume 2362 of CEUR Workshop Proceedings, 2019, 126-142.
[83] A. Gozhyj, L. Chyrun, A. Kowalska-Styczen, O. Lozynska, Uniform Method of Operative Content
     Management in Web Systems, volume Vol-2136 of CEUR Workshop Proceedings, 2018, pp. 62-77.
[84] L. Chyrun, Y. Burov, B. Rusyn, L. Pohreliuk, O. Oleshek, A. Gozhyj, I. Bobyk, Web Resource
     Changes Monitoring System Development, volume Vol-2386 of CEUR Workshop Proceedings,
     2019, pp. 255-273.
[85] O. Lozynska, V. Savchuk, V. Pasichnyk, Individual Sign Translator Component of Tourist
     Information System, volume 1080 of Advances in Intelligent Systems and Computing IV, Springer
     Nature Switzerland AG, Springer, Cham, 2020, pp. 593-601.
[86] L. Chyrun, A. Kowalska-Styczen, Y. Burov, A. Berko, A. Vasevych, I. Pelekh, Y. Ryshkovets,
     Heterogeneous Data with Agreed Content Aggregation System Development, volume Vol-2386 of
     CEUR Workshop Proceedings, 2019, pp. 35-54.
[87] B. Rusyn, L. Pohreliuk, A. Rzheuskyi, R. Kubik, Y. Ryshkovets, L. Chyrun, S. Chyrun, A.
     Vysotskyi, V. B. Fernandes, The Mobile Application Development Based on Online Music Library
     for Socializing in the World of Bard Songs and Scouts’ Bonfires, volume 1080 of Advances in
     Intelligent Systems and Computing IV, Springer, 2020, pp. 734-756.
[88] Y. Kis, L. Chyrun, T. Tsymbaliak, L. Chyrun, Development of System for Managers Relationship
     Management with Customers, volume 1020 of Lecture Notes in Computational Intelligence and
     Decision Making, 2020, pp. 405-421.
[89] L. Chyrun, L. Chyrun, Y. Kis, L. Rybak, Automated Information System for Connection to the
     Access Point with Encryption WPA2 Enterprise, volume 1020 of Lecture Notes in Computational
     Intelligence and Decision Making, 2020, pp. 389-404.
[90] N. Chukhray, N. Shakhovska, O. Mrykhina, M. Bublyk, L. Lisovska, Methodical Approach to
     Assessing the Readiness Level of Technologies for the Transfer, volume 1080 of Advances in
     Intelligent Systems and Computing IV, Springer Nature Switzerland AG, 2020, pp. 259-282.
[91] O. Kuzmin, M. Bublyk, Economic evaluation and government regulation of technogenic (man-
     made) damage in the national economy, in: Proceedings of International Conference on Computer
     sciences and information technologies, CSIT, 2016, pp. 37-39.
[92] N. Chukhray, N. Shakhovska, O. Mrykhina, M. Bublyk, L. Lisovska, Consumer aspects in assessing
     the suitability of technologies for the transfer, in: Proceedings of International Conference on
     Computer sciences and information technologies, CSIT, 2019, pp. 142-147.
[93] M. Bublyk, O. Rybytska, A. Karpiak, Y. Matseliukh, Structuring the fuzzy knowledge base of the
     IT industry impact factors, in: Proceedings of International Conference on Computer sciences and
     information technologies, CSIT, 2018.
[94] M.I. Bublyk, O. M. Rybytska, The model of fuzzy expert system for establishing the pollution impact
     on the mortality rate in Ukraine, in: Proceedings of International Conference on Computer sciences
     and information technologies, CSIT, 1, 2017, pp. 253-256.
[95] T. Basyuk, The Popularization Problem of Websites and Analysis of Competitors, volume 689 of
     Advances in Intelligent Systems and Computing, Springer, Cham, 2018, pp. 54-65.
[96] T. Basyuk, Popularization of website and without anchor promotion, in: Proceedings of International
     Scientific and Technical Conference on Computer science and information technologies, CSIT,
     2016, pp. 193-195.
[97] T. Basyuk, Innerlinking website pages and weight of links, in: Proceedings of International Scientific
     and Technical Conference on Computer science and information technologies, 2017, pp. 12-15.
[98] E. Vasilevskis, I. Dubyak, T. Basyuk, V. Pasichnyk, A. Rzheuskyi, Mobile application for
     preliminary diagnosis of diseases, volume 2255 of CEUR Workshop Proceedings, 2018, 275-286.
[99] S.S. Shcherbak, Interoperability web application models based on microformats, in: CriMiCo, 21
     International Crimean Conference: Microwave and Telecommunication Technology, 2011, pp. 57-
     58.
[100] I. Galushka, S. Shcherbak, Devising a mathematical model for pattern-based enterprise data
     integration, volume 2(9) of Eastern-European Journal of Enterprise Technologies, 2015, pp. 59-64.
[101] I. Oksanych, I. Shevchenko, I. Shcherbak, S. Shcherbak, Development of specialized services for
     predicting the business activity indicators based on micro-service architecture, volume 2(2-86) of
     Eastern-European Journal of Enterprise Technologies, 2017, pp. 50-55.
[102] L. Chyrun, I. Turok, I. Dyyak, Information Model of the Tendering System for Large Projects,
     volume Vol-2604 of CEUR workshop proceedings, 2020, pp. 1224-1236.
[103] A. Stefanchuk, O. Lozynska, T. Basyuk, O. Oborska, A. Vysotskyi, K. Mykich, I. Zavuschak
     Intelligent System of Visualization and Creation of Choreographic Setting, volume Vol-2604 of
     CEUR workshop proceedings, 2020, pp. 1196-1223.
[104] O. Veres, P. Ilchuk, O. Kots, Application of Data Mining to Exchange Rate Influence
     Identification, volume Vol-2604 of CEUR workshop proceedings, 2020, pp. 1117-1126.
[105] A. Vysotsky, V. Lytvyn, V. Vysotska, D. Dosyn, I. Lyudkevych, N. Antonyuk, O. Naum, A.
     Vysotskyi, L. Chyrun, O. Slyusarchuk, Online Tourism System for Proposals Formation to User
     Based on Data Integration from Various Sources, in: Proceedings of the International Conference on
     Computer Sciences and Information Technologies, CSIT, 2019, pp. 92-97.
[106] V. Andrunyk, A. Berko, B. Rusyn, L. Pohreliuk, S. Chyrun, B. Dokhniak, I. Karpov, M.
     Krylyshyn, Information System of Photostock Web Galleries Based on Machine Learning
     Technology, volume Vol-2604 of CEUR workshop proceedings, 2020, pp. 1032-1059.
[107] V. Andrunyk, A. Vasevych, L. Chyrun, N. Chernovol, N. Antonyuk, A. Gozhyj, V. Gozhyj, I.
     Kalinina, M. Korobchynskyi, Development of Information System for Aggregation and Ranking of
     News Taking into Account the User Needs, volume Vol-2604 of CEUR workshop proceedings,
     2020, pp. 1127-1171.
[108] O. Garasym, L. Chyrun, N. Chernovol, A. Gozhyj, V. Gozhyj, I. Kalinina, B. Rusyn, L.
     Pohreliuk, M. Korobchynskyi, Network Security Analysis Based on Consolidated Threat Resources,
     volume Vol-2604 of CEUR workshop proceedings, 2020, pp. 1004-1018.
[109] V. Lytvyn, V. Vysotska, Y. Burov, A. Demchuk, Architectural ontology designed for intellectual
     analysis of e-tourism resources, in: Proceedings of the International Conference on Computer
     Sciences and Information Technologies, CSIT, 2018, pp. 335-338.
[110] V. Lytvyn, V. Vysotska, V. Shatskykh, I. Kohut, O. Petruchenko, L. Dzyubyk, V. Bobrivetc, V.
     Panasyuk, S. Sachenko, M. Komar, Design of a recommendation system based on Collaborative
     Filtering and machine learning considering personal needs of the user, volume 4(2-100) of Eastern-
     European Journal of Enterprise Technologies, 2019, pp. 6-28.
[111] Y. Tverdokhlib, V. Andrunyk, L. Chyrun, L. Chyrun, N. Antonyuk, I. Dyyak, O. Naum, D.
     Uhryn, V. Basto-Fernandes, Analysis and Estimation of Popular Places in Online Tourism Based on
     Machine Learning Technology, volume Vol-2631 of CEUR Workshop Proceedings, 2020, pp. 457-
     470.
[112] V. Lytvyn, A. Gozhyj, I. Kalinina, V. Vysotska, V. Shatskykh, L. Chyrun, Y. Borzov, An
     intelligent system of the content relevance at the example of films according to user needs, volume
     Vol-2516 of CEUR Workshop Proceedings, 2019, pp. 1-23.
[113] N. Antonyuk, A. Vysotsky, V. Vysotska, V. Lytvyn, Y. Burov, A. Demchuk, I. Lyudkevych, L.
     Chyrun, S. Chyrun, І. Bobyk, Consolidated Information Web Resource for Online Tourism Based
     on Data Integration and Geolocation, in: Proceedings of the International Conference on Computer
     Sciences and Information Technologies, CSIT, 2019, pp. 15-20.
[114] V. Lytvyn, V. Vysotska, M. Osypov, O. Slyusarchuk, Y. Slyusarchuk, Development of
    intellectual system for data de-duplication and distribution in cloud storage, volume 16(2) of
    Webology, 2019, pp. 1-42.
[115] P. Kravets, V. Lytvyn, V. Vysotska, Y. Burov, Promoting training of multi-agent systems,
    volume Vol-2608 of CEUR Workshop Proceedings, 2020, pp. 364-378.
[116] P. Kravets, V. Lytvyn, V. Vysotska, Y. Ryshkovets, S. Vyshemyrska, S. Smailova, Dynamic
    Coordination of Strategies for Multi-agent Systems, volume 1246 of Advances in Intelligent Systems
    and Computing, Lecture Notes in Computational Intelligence and Decision Making, 2020, pp. 653-
    670.
[117] V. Vysotska, A. Berko, V. Lytvyn, P. Kravets, L. Dzyubyk, Y. Bardachov, S. Vyshemyrska,
    Information Resource Management Technology Based on Fuzzy Logic, volume 1246 of Advances
    in Intelligent Systems and Computing, Lecture Notes in Computational Intelligence and Decision
    Making, 2020, pp. 164-182.
[118] D. Uhryn, O. Naum, N. Antonyuk, I. Dyyak, L. Chyrun, A. Demchuk, V. Vysotska, Z. Rybchak,
    T. Batiuk, Tourist Itineraries Plan Design Based on the Behavior of Bee Colonies, volume Vol-2631
    of CEUR Workshop Proceedings, 2020, pp. 516-539.
[119] A. Gozhyj, I. Kalinina, V. Vysotska, S. Sachenko, R. Kovalchuk, Qualitative and Quantitative
    Characteristics Analysis for Information Security Risk Assessment in E-Commerce Systems, volume
    Vol-2762 of CEUR Workshop Proceedings, 2020, pp. 177-190.
[120] V. Vysotska, A. Berko, M. Bublyk, L. Chyrun, A. Vysotsky, K. Doroshkevych, Methods and
    tools for web resources processing in e-commercial content systems, in: Proceedings of IEEE 15th
    International Scientific and Technical Conference on Computer Sciences and Information
    Technologies, CSIT, 2020, 1, pp. 114-118.
[121] B. Clifton. Advanced web metrics with Google Analytics. John Wiley & Sons, 2012.
[122] B. Clifton, Google analytics. Podrobný průvodce webovými statistikami, 1, 2009.
[123] R. Kashyap, M. Fatehkia, R. A. Tamime, I. Weber, Monitoring global digital gender inequality
    using the online populations of Facebook and Google, volume 43 of Demographic Research, 2020,
    pp. 779-816.
[124] H. Davis, Google advertising tools: Cashing in with AdSense, AdWords, and the Google APIs.
    O'Reilly Media, Inc., 2006.
[125] B. Geddes, Advanced Google AdWords. John Wiley & Sons, 2014.
[126] A. Gozhyj, I. Kalinina, V. Gozhyj, V. Vysotska, Web service interaction modeling with colored
    petri nets, in: Proceedings of International Conference on Intelligent Data Acquisition and Advanced
    Computing Systems: Technology and Applications, IDAACS, 1, 2019, pp. 319-323.
[127] P. Bidyuk, A. Gozhyj, I. Kalinina, V. Vysotska, Methods for Forecasting Nonlinear Non-
    stationary Processes in Machine Learning, volume 1158 of Communications in Computer and
    Information Science, Springer, Cham, 2020, pp. 470-485.
[128] V. Lytvynenko, N. Savina, M. Pyrtko, M. Voronenko, R. Baranenko, I. Lopushynskyi,
    Development, validation and testing of the Bayesian network to evaluate the national law
    enforcement agencies’ work, in: Proceedings of 9nd International Conference on Advanced
    Computer Information Technologies, ACIT, 2019, рр. 252-256.
[129] V. Lytvynenko, N. Savina, J. Krejci, M. Voronenko, M. Yakobchuk, O. Kryvoruchko. Bayesian
    Networks' Development Based on Noisy-MAX Nodes for Modeling Investment Processes in
    Transport, volume Vol-2386 of CEUR Workshop Proceedings, 2019, pp. 1-10.
[130] V. Lytvynenko, І. Lurie, M. Voronenko, N. Savina, J. Krejci, A. Fefelov, I. Lopushynskyi, P.
    Vorona, The use of Bayesian methods in the task of localizing the narcotic substances distribution,
    in: Proceedings of the IEEE 14th International Scientific and Technical Conference on Computer
    Sciences and Information Technologies, CSIT, 2019, pp.60-63.
[131] V. Lytvynenko, N. Savinа, М. Voronenko, N. Doroschuk, S. Smailova, О. Boskin, T.
    Kravchenko, Development, Validation and Testing of the Bayesian Network of Educational
    Institutions Financing, in: Proceedings of International Conference on The crossing point of
    Intelligent Data Acquisition & Advanced Computing Systems and East & West Scientists, IDAACS,
    2019, pp. 412-418.
[132] R. Yurynets, Z. Yurynets, I. Myshchyshyn, N. Zhyhaylo, A. Pekhnyk, Optimal Strategy for the
    Development of Insurance Business Structures in a Competitive Environment, volume Vol-2631 of
    CEUR Workshop Proceedings, 2020, pp. 79-94.
[133] R. Yurynets, Z. Yurynets, M. Kokhan, Econometric Analysis of the Impact of Expert
    Assessments on the Business Activity in the Context of Investment and Innovation Development,
    volume Vol-2604 of CEUR workshop proceedings, 2020, pp. 680-694.
[134] A. Vasyliuk, T. Basyuk, V. Lytvyn, Specialized Interactive Methods for Using Data on Radar
    Application Models, volume Vol-2631 of CEUR Workshop Proceedings, 2020, pp. 1-11.
[135] V. Lytvynenko, N. Savinа, М. Voronenko, A. Pashnina, R. Baranenko, N. Krugla, I.
    Lopushynskyi, Development of the Dynamic Bayesian Network to Evaluate the National Law
    Enforcement Agencies’ Work, in: The crossing point of Intelligent Data Acquisition & Advanced
    Computing Systems and East & West Scientists, IDAACS, 2019, pp. 418-424.
[136] V. Lytvyn, I. Peleshchak, R. Peleshchak, V. Vysotska, Information Encryption Based on the
    Synthesis of a Neural Network and AES Algorithm, in: Proceedings of 3rd International Conference
    on Advanced Information and Communications Technologies, AICT, 2019, pp. 447-450.