<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Method for Detecting Propaganda Objects Using Deep Learning Neural Network Models with Visual Analytic ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Iurii</forename><surname>Krak</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Glushkov Institute of Cybernetics of NAS of Ukraine</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Olha</forename><surname>Zalutska</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Maryna</forename><surname>Molchanova</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Olexander</forename><surname>Mazurets</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Olexander</forename><surname>Barmak</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Method for Detecting Propaganda Objects Using Deep Learning Neural Network Models with Visual Analytic ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">1CB93D263DEABDBFE2509A063D579D87</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T16:49+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>propaganda objects</term>
					<term>propaganda techniques</term>
					<term>detecting propaganda</term>
					<term>visual analytics 1</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Approach to solving the problem of identifying propaganda objects was developed, which allows to find in propaganda texts who and what propaganda techniques are aimed at. Significant problems of propaganda detection were solved, namely: absence of a thorough examination of the connections between propaganda techniques and their targets within texts; lack of synthesized insights regarding propaganda targets and their alternative references in textual materials. Developed method for detecting propaganda objects allows to convert input data in form test text for detect propaganda objects, set of used techniques in the test text and set of neural network models trained to analyze every propaganda techniques, into output data in form semantic model of propaganda for test text. Semantic model of propaganda include set of propaganda objects, set of words representations objects with their semantic evaluation and set of important relations between propaganda techniques and propaganda objects in test text with semantic importance evaluation. Proposed method for detecting propaganda objects has demonstrated full alignment with the results obtained by expert evaluations.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>One of the most serious challenges facing humanity in the digital age is propaganda <ref type="bibr" target="#b0">[1]</ref>. The main purpose of propaganda is the manipulation of objects in order to achieve certain political, social, economic or cultural goals <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3]</ref>.</p><p>Objects of propaganda are understood as individuals, groups, organizations, social strata, as well as phenomena or institutions to which propaganda efforts are directed in order to influence their consciousness, emotions, behavior and public opinion <ref type="bibr" target="#b3">[4]</ref>.</p><p>The aim of the research is to develop a method for detecting propaganda objects using deep learning neural network models, which allows detecting specific objects targeted by specific propaganda techniques. The main contributions of the paper can be summarized as follows:</p><p>• Method for detecting propaganda objects is developed, which enables the identification of the specific individuals or entities targeted by propaganda techniques within the analyzed texts.</p><p>Information Technology and Implementation (IT&amp;I-2024), <ref type="bibr">November 20-21, 2024</ref>, Kyiv, Ukraine Corresponding author. yuri.krak@gmail.com (I. Krak); zalutsk.olha@gmail.com (O. Zalutska); m.o.molchanova@gmail.com (M. Molchanova); exe.chong@gmail.com (O. Mazurets); alexander.barmak@gmail.com (O. <ref type="bibr">Barmak)</ref> 000-0002-8043-0785 (I. Krak); 0000-0003-1242-3548 (O. Zalutska); 0000-0001-9810-936X (M. Molchanova); 0000-0002-8900-0650 (O. Mazurets); 0000-0003-0739-9678 (O. <ref type="bibr">Barmak)</ref> • The effectiveness of developed method application has been experimentally proven, which allows, in contrast to existing analogues, to expand the list of available propaganda objects at the expense of words representations objects, in addition to searching for NER. • Visual interpretation of the identified propaganda targets was conducted, enabling clear observation of the subjects influenced within the framework of applied propaganda techniques.</p><p>The next section presents an overview of related works in the field of detecting propaganda and its objects. Section 4 offers an overview of the experiment to investigate the effectiveness of the proposed approach. Section 5 offers an overview of the obtained results with comparisons and discussions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Works</head><p>The emergence of diverse media channels in the information age has marked a new chapter in communication and information accessibility, simultaneously amplifying opportunities for propaganda and the manipulation of public opinion <ref type="bibr" target="#b4">[5]</ref>. Identifying propagandistic content requires not only recognizing the content but also determining its intended targets or objectives. Identification of objects of propaganda is critically important for understanding the mechanisms of manipulation, therefore it attracts the special attention of scientists.</p><p>Existing researches highlight the problem relevance of automated detection of propaganda in text web content. A significant number of studies are currently focused on the intellectualization of propaganda detection processes to address various technological challenges in monitoring media sources <ref type="bibr" target="#b5">[6]</ref> and distinguishing propaganda techniques from other forms of manipulative influence <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>. Propaganda encompasses subjects, content, forms, methods <ref type="bibr" target="#b8">[9]</ref>, and channels of information dissemination <ref type="bibr" target="#b9">[10]</ref>. Its primary target is social groups or audiences subjected to influence.</p><p>Detecting propaganda in text using natural language processing (NLP) presents considerable challenges due to its reliance on subtle manipulation techniques and contextual dependencies. Researchers in <ref type="bibr" target="#b10">[11]</ref> explored the effectiveness of modern large language models for identifying propaganda, conducting experiments on datasets containing news articles. Their findings indicate that modern large language models achieve performance levels comparable to the current state-ofthe-art methods <ref type="bibr" target="#b11">[12]</ref>.</p><p>Effective approaches for semantic text content analysis, such as multimodal visual-text object graph attention networks <ref type="bibr" target="#b12">[13]</ref> and statistical test analysis <ref type="bibr" target="#b13">[14]</ref>, have been noted as valuable tools for detecting propaganda <ref type="bibr" target="#b14">[15]</ref>. Additionally, the use of transformer-based neural networks <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17]</ref> and complex neural architectures, including RoBERTa <ref type="bibr" target="#b17">[18]</ref>, GPT <ref type="bibr" target="#b18">[19]</ref>, and RNN <ref type="bibr" target="#b19">[20]</ref>, has emerged as a prominent direction in propaganda detection research.</p><p>Certain studies focus on specific components of propaganda, such as racial propaganda <ref type="bibr" target="#b20">[21]</ref> or fake news <ref type="bibr" target="#b21">[22]</ref>. The authors of <ref type="bibr" target="#b22">[23]</ref> emphasize that most existing methods for detecting propaganda primarily analyze linguistic features of its content but often overlook the contextual information from the external media environment where propaganda originates and spreads.</p><p>Another problem with propaganda detection is the lack of reliably labeled data sources. To help the scientific community identify propaganda in text news, research <ref type="bibr" target="#b23">[24]</ref> proposed a library of propaganda texts (ProText). Verity labels are assigned to ProText repositories after manual and automated verification using fact-checking techniques. The authors used a natural language processing approach to create a system that uses deep learning to automatically identify propaganda in the news. A fine-tuned robustly optimized BERT (RoBERTa) pre-training approach and word embedding using multi-label, multi-class text classification is proposed. Performance estimation accuracies of 90%, 75%, 68%, and 65% were achieved on ProText, PTC, TSHP-17, and Qprop, respectively. The big data method, especially with deep learning models, can help to fill the unsatisfactory big data in the new text classification strategy.</p><p>There are two main approaches to detecting propaganda: a named object detection approach and a text classification approach.</p><p>When detecting propaganda as a named entity recognition (NER) task, the problem arises that fragments of text containing propaganda are longer than NER (for example, names of persons or places) and can include tens of words. In <ref type="bibr" target="#b24">[25]</ref>, the value of the range length that affects the recognition of propaganda is investigated, showing that the difficulty of the task does increase with the increase of the range length. Various commonly used approaches to the task are systematically assessed by evaluating their ability to accurately replicate the length distribution of actual intervals. Additionally, a novel solution is introduced, incorporating an adaptive convolution layer designed to enable information exchange between distant words. This approach enhances length preservation while maintaining overall performance.</p><p>Document-level approach to propaganda detection is presented in <ref type="bibr" target="#b25">[26]</ref>, which explores the potential of using large language models (LLMs), such as those underlying ChatGPT, to identify propaganda features in news articles. The methods discussed build upon the work of Martino et al., who defined a set of 18 distinct propaganda techniques. Using these techniques, an enhanced framework is developed that integrates news articles from Russia Today (RT), a well-known statecontrolled media outlet, with the SemEval-2020 Task 11 dataset. The tip and article content are then fed to the gpt-3.5-turbo model OpenAI to determine what propaganda techniques are present and make a final decision on whether an article is propaganda or not. A subset of the results obtained is then analyzed to determine whether the LLM can be effectively used in this way. The authors report an accuracy of 25.12% using the SemEval-2022 dataset.</p><p>Thus, based on the results of the analysis of related works in the field of identifying propaganda techniques and propaganda objects, two problems were revealed: the lack of a comprehensive analysis of the relationships between propaganda techniques and objects in the texts; lack of synthesized insights regarding propaganda targets and their alternative references in textual materials. Propaganda detected by searching for named entities only has no visibility into the direction of propaganda through the use of techniques; however, the propaganda techniques detected at document level do not reflect the objects of propaganda direction <ref type="bibr" target="#b26">[27]</ref>. At the same time, when identifying propaganda as named entity recognition (NER) task, the problem arises that propaganda objects are not presented by proper names or even synonyms, and their semantic proximity is not reflected in an obvious way. The paper proposes solution to these problems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Method Design</head><p>It is believed that the propaganda techniques used in the text can be detected by one of the existing neural network approaches <ref type="bibr" target="#b10">[11]</ref>, while the secondary result will be appropriate neural network models trained to detect individual propaganda techniques. Thus, the proposed approach for identifying propaganda objects and comparing them with the applied techniques is illustrated in Figure <ref type="figure">1</ref>. This approach provides a comprehensive analysis of the relationships between propaganda techniques and their objects within texts, as well as generalizations for the objects of propaganda and their alternative mentions in the texts. Its distinction from existing methods lies in combining two complementary tasks: the identification of propaganda objects and correlating the identified objects with numerical values assigned to the detected techniques.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1: Proposed approach for identifying propaganda objects</head><p>Within the framework of the proposed approach, 17 separate pre-trained neural network models of the transformer architecture will be used, which allows determining 17 main propaganda techniques, such as: «Appeal to fear-prejudice», «Causal Oversimplification», «Doubt», «Exaggeration», «Flag-Waving», «Labeling», «Loaded Language», «Minimisation», «Name Calling», «Repetition», «Appeal to Authority», «Black and White Fallacy», «Reductio ad hitlerum», «Red Herring», «Slogans», «Thought terminating Cliches», «Whataboutism» <ref type="bibr" target="#b27">[28]</ref>.</p><p>The proposed neural networks are trained on labeled data collected by the Analysis Project team (https://propaganda.qcri.org/index.html), which analyzed the texts, detecting all segments that incorporate propaganda techniques along with identifying their specific types. Specifically, they developed a dataset of news articles that were manually annotated at the segment level based on eighteen distinct propaganda techniques. Dataset includes 788 articles.</p><p>The method of detecting propaganda objects created in accordance with the proposed approach uses neural network tools, and allows detecting the belonging of objects to the used propaganda techniques, and uses the following presentation of propaganda semantic model SMP in the test text for test text T (Figure <ref type="figure">2</ref>). Method for detecting propaganda objects as input data has test text for detect propaganda objects T, set of used techniques in the test text and set of neural network models , trained to analyze every propaganda techniques.</p><formula xml:id="formula_0">T: SMP = Metadata, (<label>1</label></formula><p>The first stage is named entity recognition (NER) using by «STANZA» neural network library. Since named entities can contain repetitions, all repetitions are removed at the level of lems at this stage as well. The initial data of first stage is the set of propaganda objects PO by NER without repetitions.</p><p>The second stage will be to search for words-objects that are close in meaning to each named entity. This need arises because objects of propaganda are a slightly broader concept than NER contained in the set of PO. They also include aspects of culture, groups of objects united by certain characteristics, etc. A pre-trained «FastText» model developed by Facebook AI Research will be used to find NER-like objects. «FastText» supports the «CBOW» and «Skip-gram» models, which makes it possible to effectively analyze the context of words and identify semantic relationships between them <ref type="bibr" target="#b28">[29]</ref>. The use of «FastText» in this context is appropriate, as the model allows the detection of similar words and objects based on contextual vectors, which is useful for expanding the range of detected propaganda objects beyond named entities. The «FastText» model is retrained before being used on propaganda texts. The initial data of the stage is expansion of PO at the expense of words representations objects PO'. The minimum semantic proximity is set depending on the task, determined empirically. No threshold was applied in this study.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 2: Scheme of method for detecting propaganda objects</head><p>The next step is the step of constructing CW context windows for each propaganda object with . In the framework of the work, the context window is understood as the sentence where the specified object of propaganda is found <ref type="bibr" target="#b29">[30]</ref>. If one context window contains several objects of propaganda, the windows are not duplicated (for one propaganda object).</p><p>According to CW', detecting level of propaganda techniques use in CW' by neural network models NM' is carried out. The assessment of the context windows' belonging to the used techniques is carried out by vectorizing the context windows CW' with corresponding vectors of traffic jams NM' and analyzing its belonging to each of techniques presented in text T.</p><p>The last stage is the building set of important relations between techniques and objects for text T. If the strength of the manifestation of the technique is below a certain threshold value, within the framework of the evaluation of the element of the set , the technique is not considered applied to the group of objects.</p><p>The initial data of the proposed approach are visual representation of semantic model of propaganda SMP for text T which include: set of propaganda objects; set of words representations objects with their semantic evaluation; set of important relations between techniques TT' and objects PO' in text T with semantic importance evaluation.</p><p>Therefore, an approach has been developed that allows detection of objects of propaganda that go beyond the detection of NER, and also allows to assess the affiliation of detected objects of propaganda to the propaganda techniques used in the text.</p><p>Accordingly, developed method for detecting propaganda objects allows to convert input data in form test text for detect propaganda objects (T), set of used techniques in the test text ( ) and set of neural network models ( ) trained to analyze every propaganda techniques into output data in form semantic model of propaganda SMP for test text T. Semantic model of propaganda SMP include set of propaganda objects PO, set of words representations objects with their semantic evaluation and set of important relations between techniques and objects in test text T with semantic importance evaluation .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Experiment</head><p>To evaluate the effectiveness of the developed method for detecting propaganda objects, specialized software was created. This software facilitated the identification of propaganda objects and their comparison with the applied propaganda techniques. The obtained results in the form of visual analytics were compared with the results of the analysis of these sources by authoritative resources and experts in detecting and countering propaganda.</p><p>To conduct the experiment, software was created in the form of a web application in the Python programming language. Interface of the experimental software is shown in Figure <ref type="figure" target="#fig_0">3</ref>. For the analysis, posts from social media were selected, processed by the «Strategic Communications Center» (https://spravdi.gov.ua/) and the «Disinformation Countering Center» (https://cpd.gov.ua/). These posts have been previously labeled and include expert conclusions, which can be compared with the original data produced by the proposed approach. Specialized software was developed for this analysis, incorporating a method for detecting propaganda objects.</p><p>The web application utilizes 17 pre-trained neural network transformation models (derived from previous research), the «Stanza» neural network library for named entity recognition (NER), the «Flask» framework, and the «FastText» pre-trained model, which has been retrained on propaganda texts. The software provides functionality for detecting the techniques used in text, identifying propaganda objects, and analyzing the association between detected objects and the applied techniques. Figure <ref type="figure" target="#fig_1">4</ref> shows the step-by-step illustration of proposed approach. The next stage is the construction of context windows for the found objects. Window 1: {Greece (NER): «chaos» (0.32) , «mistakes» (0.26), «collapse» (0.21)}: «If you do not support our plan, you will face an economic collapse, as happened in Greece during the debt crisis. Our opponents only promise change, but their actions will lead to complete chaos. Do you want to repeat their mistakes, risking the future of your children?» (in original Ukrainian: { (NER) }: « »). Window 2: {China (NER): «plan» (0.51), «future» (0.27)}: «China deserves better. If you do not support our plan, you will face an economic collapse, as happened in Greece during the debt crisis» (in original Ukrainian: { (NER) }: « »). The last step is to search for techniques in context windows. The assessment of the presence of the technique is carried out by evaluating the context window with a neural network trained to identify the techniques expressed in the text. For this example: {Greece: «chaos» (0.32), «mistakes» (0.26), «collapse» (0.21)} (in original Ukrainian: { (0.21)}) «Appeal to fear-prejudice» technique was rated at 0.78, « Causal Oversimplification» technique was rated at 0.65. At the same time, for {China: «plan» (0.51), «future» (0.27)} (in original Ukrainian: { (0.27)), «Appeal to fear-prejudice» was rated at 0.51, «Causal Oversimplification» was rated at 0.68.</p><p>Considering the content of the context windows, Window 1 has more pronounced manifestations of both techniques (especially «Appeal to fear-prejudice»). Window 2 has a less pronounced «Appeal to fear-prejudice» technique and a more pronounced «Causal Oversimplification» technique due to the simplified interpretation of causes and effects.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Results and discussion</head><p>When training neural network models of the transformer architecture based on pre-trained BERT models, an accuracy of more than 80% was achieved for detecting propaganda techniques <ref type="bibr" target="#b17">[18]</ref>, the accuracy results of the BERT models are shown in Table <ref type="table" target="#tab_1">1</ref>.</p><p>Regarding the study of the effectiveness of the proposed method for identifying propaganda techniques and the objects they are aimed at, here the results correlate with the conclusions of researchers from the «Strategic Communications Center» (https://spravdi.gov.ua/) and «Disinformation Countering Center» (https://cpd.gov.ua/). For example, a post from the propaganda channel and the expert's conclusion are shown on Figure <ref type="figure" target="#fig_2">5</ref>.</p><p>As can be seen from Figure <ref type="figure" target="#fig_2">5</ref>, the post is aimed at:</p><p>• justifying the use of nuclear weapons against the United States;</p><p>• further Western intervention threatens to escalate the war;</p><p>• portraying the West as a weak opponent (discrediting).</p><p>As part of the analysis obtained by using the developed software installation, the following data were obtained:</p><p>• used propaganda techniques with manifestation powers: «Appeal to fear-prejudice» with rating of 0.598, «Loaded Language» with rating of 0.46 and «Exaggeration» with rating of 0.356;  The use of the «Appeal to Fear-Prejudice» technique in the text is followed by the intention to create fear about the potential use of nuclear weapons, intimidation with massive strikes and the description of the USA as a vulnerable target creates a feeling of anxiety and uncertainty in the reader.</p><p>The use of the «Loaded Language» technique is followed by expressions such as and deliberately selected to evoke strong emotions such as anger or fear.</p><p>The «Exaggeration» technique is expressed by exaggerating the weakness of the US defense systems and the ability to deliver an irresistible blow, An example of the analysis performed by the program is shown in Figure <ref type="figure" target="#fig_3">6</ref>. As shown in Figure <ref type="figure" target="#fig_3">6</ref>, the analysis not only identified propaganda objects and the techniques used but also determined how the identified objects were linked to the techniques applied.</p><p>Thus, the study evaluating the effectiveness of the developed method revealed that the technique for detecting propaganda objects produces results that align perfectly with the expert findings. Additionally, by treating propaganda as a unified model and employing visual analytics for the results, it was possible to conduct a thorough analysis of the relationships between propaganda techniques and objects, as well as to generalize the objects of propaganda and their alternative references in the texts.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusions</head><p>As part of the main goal, approach to solving the problem of identifying propaganda objects was developed, which allows to find in propaganda texts who and what propaganda techniques are aimed at. Significant problems of propaganda detection were solved, namely: absence of a thorough examination of the connections between propaganda techniques and their targets within texts; lack of synthesized insights regarding propaganda targets and their alternative references in textual materials. The effectiveness of the proposed approach has been experimentally demonstrated, offering a significant advantage over existing methods. In addition to performing named entity recognition (NER) with the «STANZA» neural network library, it expands the list of identified propaganda objects in texts by utilizing the «FastText» machine learning library. Furthermore, the approach provides an assessment that correlates the detected objects with the applied techniques. For user convenience, a visual representation of the identified propaganda objects is also provided, enabling a clear visualization of the influence targets within the framework of the used propaganda techniques.</p><p>Developed method for detecting propaganda objects use deep learning neural network models and includes stages: building set of propaganda objects by named entity recognition; text preprocessing and expansion of propaganda objects at expense of words representations objects; building context windows and they association by every words representations objects as context multiwindows; detecting level of propaganda techniques use in context multiwindows by neural network models; building set of important relations between propaganda techniques and propaganda objects for test text. Accordingly, developed method for detecting propaganda objects allows to convert input data in form test text for detect propaganda objects, set of used techniques in the test text and set of neural network models trained to analyze every propaganda techniques, into output data in form semantic model of propaganda for test text. Semantic model of propaganda include set of propaganda objects, set of words representations objects with their semantic evaluation and set of important relations between propaganda techniques and propaganda objects in test text with semantic importance evaluation.</p><p>To evaluate the effectiveness of the developed method for detecting propaganda objects, specialized software was created. This software facilitated the identification of propaganda objects and their comparison with the techniques employed in the content. The obtained results in the form of visual analytics were compared with the results of the analysis of these sources by authoritative resources and experts in detecting and countering propaganda. As a result, proposed method for detecting propaganda objects has demonstrated full alignment with the results obtained by expert evaluations. Further research is planned to be directed to the automation of the process of comparing the obtained results with the results obtained by experts. Also, further research will be aimed at developing a method for automated dynamic determination of minimum threshold values for detecting propaganda techniques occurrences, which will allow identifying the key features of combination of objects and propaganda techniques used in test text, while not overloading the model by noise in the form of insignificant semantic manifestations of sentiment.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Declaration on Generative AI</head><p>Authors have not employed any Generative AI tools.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: An example of obtaining the result with visual analytics by developed software</figDesc><graphic coords="6,87.30,307.82,426.05,232.48" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: An example of propaganda objects data conversion by method</figDesc><graphic coords="7,90.75,62.35,447.00,468.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Analysis of post which contains propaganda, from «Disinformation Countering Center» (https://cpd.gov.ua/)</figDesc><graphic coords="9,76.55,471.71,447.47,251.70" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Analysis of test text with propaganda by developed software</figDesc><graphic coords="10,76.55,227.88,447.46,178.45" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="5,118.20,103.70,364.30,364.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>Metadata auxiliary components complex. Auxiliary components complex Metadata in (1) include components that are not an informative display of the propaganda model in the text, but are used to obtain initial data: CW set of context windows which contain every emergence of words representations objects in the test text T; set of united context windows associated with every words representations objects in the test text T for neural network analyze.Method for detecting propaganda objects using deep learning neural network models and includes stages: building set of propaganda objects PO by named entity recognition; text preprocessing and expansion of PO at expense of words representations objects; building context windows CW and association of CW by</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>)</cell></row><row><cell>where</cell><cell cols="4">set of words representations objects in the test text T with their semantic evaluation</cell></row><row><cell>(</cell><cell cols="4">PO); PO set of propaganda objects in the test text T detected by NER;</cell><cell>set of used</cell></row><row><cell cols="2">techniques in the test text (</cell><cell cols="3">TT); TT set of all possible techniques;</cell><cell>set of important</cell></row><row><cell cols="2">relations between techniques</cell><cell cols="2">and objects</cell><cell>in text T with semantic importance evaluation;</cell></row><row><cell></cell><cell></cell><cell cols="2">Metadata = T</cell><cell>CW</cell><cell>,</cell><cell>(2)</cell></row><row><cell cols="3">where T pre-processed test text;</cell><cell cols="2">set of neural network models trained to analyze every</cell></row><row><cell cols="5">propaganda techniques; ; detecting level of propaganda techniques use in</cell></row><row><cell cols="2">by neural network models</cell><cell cols="3">; building set of important relations</cell><cell>between techniques</cell></row><row><cell cols="2">and objects</cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1</head><label>1</label><figDesc>Accuracy of propaganda techniques detection by neural network models</figDesc><table><row><cell cols="4">• propaganda objects: NER together with words semantically close to them with closeness</cell></row><row><cell cols="3">ratings, software output data: «</cell><cell>[</cell><cell>]</cell></row><row><cell>[</cell><cell></cell><cell></cell><cell>]»;</cell></row><row><cell cols="4">• assessment of important relations of propaganda objects to the techniques used, software</cell></row><row><cell cols="2">output data: «</cell><cell cols="2">[Appeal to fear-prejudice 0.578; Loaded Language 0.473; Exaggeration</cell></row><row><cell>0.311]</cell><cell cols="3">[Appeal to fear-prejudice 0.611; Loaded Language 0.4; Exaggeration 0.379]»;</cell></row><row><cell cols="4">• visual presentation of found objects in custom text.</cell></row><row><cell></cell><cell cols="3">Techniques of propaganda</cell><cell>Accuracy</cell></row><row><cell cols="3">«Appeal to fear-prejudice»</cell><cell>0.87</cell></row><row><cell cols="3">«Causal Oversimplification»</cell><cell>0.82</cell></row><row><cell>«Doubt»</cell><cell></cell><cell></cell><cell>0.93</cell></row><row><cell cols="2">«Exaggeration»</cell><cell></cell><cell>0.80</cell></row><row><cell cols="2">«Flag-Waving»</cell><cell></cell><cell>0.92</cell></row><row><cell cols="2">«Labeling»</cell><cell></cell><cell>0.96</cell></row><row><cell cols="2">«Loaded Language»</cell><cell></cell><cell>0.97</cell></row><row><cell cols="2">«Minimisation»</cell><cell></cell><cell>0.90</cell></row><row><cell cols="2">«Name Calling»</cell><cell></cell><cell>0.92</cell></row><row><cell cols="2">«Repetition»</cell><cell></cell><cell>0.94</cell></row><row><cell cols="3">«Appeal to Authority»</cell><cell>0.89</cell></row><row><cell cols="3">«Black and White Fallacy»</cell><cell>0.91</cell></row><row><cell cols="3">«Reductio ad hitlerum»</cell><cell>0.87</cell></row><row><cell cols="2">«Red Herring»</cell><cell></cell><cell>0.80</cell></row><row><cell>«Slogans»</cell><cell></cell><cell></cell><cell>0.86</cell></row><row><cell cols="3">«Thought terminating Cliches»</cell><cell>0.80</cell></row><row><cell cols="2">«Whataboutism»</cell><cell></cell><cell>0.79</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Propaganda Detection And Challenges Managing Smart Cities Information On Social Media</title>
		<author>
			<persName><forename type="first">P</forename><surname>Ahmad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Khan</surname></persName>
		</author>
		<idno type="DOI">10.4108/eetsc.v7i2.2925</idno>
	</analytic>
	<monogr>
		<title level="j">EAI Endorsed Transactions on Smart Cities</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="e2" to="e2" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Propaganda Detection Robustness Through Adversarial Attacks Driven by eXplainable AI</title>
		<author>
			<persName><forename type="first">D</forename><surname>Cavaliere</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gallo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Stanzione</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-44067-0_21</idno>
	</analytic>
	<monogr>
		<title level="m">World Conference on Explainable Artificial Intelligence</title>
				<meeting><address><addrLine>Cham; Nature Switzerland</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="405" to="419" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Online Propaganda Detection, Data Mining and Knowledge Discovery Handbook</title>
		<author>
			<persName><forename type="first">M</forename><surname>Last</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-24628-9_31</idno>
		<imprint>
			<date type="published" when="2023">2023</date>
			<publisher>Springer International Publishing</publisher>
			<biblScope unit="volume">703</biblScope>
			<biblScope unit="page">719</biblScope>
			<pubPlace>Cham</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Paper bullets: Modeling propaganda with the help of metaphor</title>
		<author>
			<persName><forename type="first">D</forename><surname>Rodríguez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Dankers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Nakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Shutova</surname></persName>
		</author>
		<idno type="DOI">10.18653/v1/2023.findings-eacl.35</idno>
	</analytic>
	<monogr>
		<title level="j">Findings of the Association for Computational Linguistics</title>
		<imprint>
			<biblScope unit="volume">472</biblScope>
			<biblScope unit="page">489</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Detecting Propaganda in News Articles Using Large Language Models</title>
		<author>
			<persName><forename type="first">D</forename><surname>Jones</surname></persName>
		</author>
		<idno type="DOI">10.13140/RG.2.2.34115.17446</idno>
	</analytic>
	<monogr>
		<title level="j">Open Access</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="1" to="12" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">How persuasive is AI-generated propaganda</title>
		<author>
			<persName><forename type="first">J</forename><surname>Goldstein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Chao</surname></persName>
		</author>
		<author>
			<persName><surname>Sh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Grossman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Stamos</surname></persName>
		</author>
		<author>
			<persName><surname>Tomz</surname></persName>
		</author>
		<idno type="DOI">10.1093/pnasnexus/pgae034</idno>
	</analytic>
	<monogr>
		<title level="j">PNAS Nexus</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Exposing Propaganda: an Analysis of Stylistic Cues Comparing Human Annotations and Machine Classification</title>
		<author>
			<persName><forename type="first">G</forename><surname>Faye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Icard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Casanova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Chanson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Maine</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Bancilhon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Gadek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Gravier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Egre</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Third Workshop on Understanding Implicit and Underspecified Language</title>
				<meeting>the Third Workshop on Understanding Implicit and Underspecified Language</meeting>
		<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page" from="62" to="72" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Detecting Propaganda Techniques in English News Articles using Pre-trained Transformers</title>
		<author>
			<persName><forename type="first">M</forename><surname>Abdullah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Altiti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Obiedat</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICICS55353.2022.9811117</idno>
	</analytic>
	<monogr>
		<title level="m">13th International Conference on Information and Communication Systems (ICICS)</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="301" to="308" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Recognition of Propaganda Techniques in Newspaper Texts: Fusion of Content and Style Analysis</title>
		<author>
			<persName><forename type="first">A</forename><surname>Horak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sabol</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Herman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Baisa</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.eswa.2024.124085</idno>
	</analytic>
	<monogr>
		<title level="j">Expert Systems with Applications</title>
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Fine-Grained Analysis of Propaganda in News Article</title>
		<author>
			<persName><forename type="first">G</forename><surname>Martino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Barron-Cedeno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Petrov</surname></persName>
		</author>
		<author>
			<persName><surname>Nakov</surname></persName>
		</author>
		<idno type="DOI">10.18653/v1/D19-1565</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing</title>
				<meeting>the 2019 Conference on Empirical Methods in Natural Language Processing</meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="5640" to="5650" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">SemEval-2020 Task 11: Detection of Propaganda Techniques in News Articles</title>
		<author>
			<persName><forename type="first">G</forename><surname>Martino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Barron-Cedeno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Wachsmuth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Petrov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Nakov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Fourteenth Workshop on Semantic Evaluation</title>
				<meeting>the Fourteenth Workshop on Semantic Evaluation</meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="1377" to="1414" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">The Imitation Game: Detecting Human and AI-Generated Texts in the Era of ChatGPT and BARD</title>
		<author>
			<persName><forename type="first">K</forename><surname>Hayawi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Shahriar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Mathew</surname></persName>
		</author>
		<idno type="DOI">10.1177/01655515241227531</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Information Science</title>
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Multimodal Visual-Textual Object Graph Attention Network for Propaganda Detection in Memes</title>
		<author>
			<persName><forename type="first">P</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Piao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Ding</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Cui</surname></persName>
		</author>
		<idno type="DOI">10.1007/s11042-023-15272-6</idno>
	</analytic>
	<monogr>
		<title level="j">Multimedia Tools and Applications</title>
		<imprint>
			<biblScope unit="volume">83</biblScope>
			<biblScope unit="issue">12</biblScope>
			<biblScope unit="page" from="36629" to="36644" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">The Practice Investigation of the Information Technology Efficiency for Automated Definition of Terms in the Semantic Content of Educational Materials</title>
		<author>
			<persName><forename type="first">I</forename><surname>Krak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Barmak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Mazurets</surname></persName>
		</author>
		<idno type="DOI">10.15407/pp2016.02-03.237</idno>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="volume">1631</biblScope>
			<biblScope unit="page" from="237" to="245" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Information technology for creation of semantic structure of educational materials</title>
		<author>
			<persName><forename type="first">O</forename><surname>Barmak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Mazurets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Krak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kulias</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Smolarz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Azarova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Gromaszek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Smailova</surname></persName>
		</author>
		<idno type="DOI">10.1117/12.2537064</idno>
	</analytic>
	<monogr>
		<title level="j">Proceedings of SPIE The International Society for Optical Engineering</title>
		<imprint>
			<biblScope unit="page">1117623</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Empowering Propaganda Detection in Resource-Restraint Languages: A Transformer-Based Framework for Classifying Hindi News Articles</title>
		<author>
			<persName><forename type="first">D</forename><surname>Chaudhari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pawar</surname></persName>
		</author>
		<idno type="DOI">10.3390/bdcc7040175</idno>
	</analytic>
	<monogr>
		<title level="j">Big Data and Cognitive Computing</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page">175</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Combating Propaganda Texts Using Transfer Learning</title>
		<author>
			<persName><forename type="first">A</forename><surname>Malak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Abujaber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Al-Qarqaz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Abbott</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hadzikadic</surname></persName>
		</author>
		<idno type="DOI">10.11591/ijai.v12.i2.pp956-965</idno>
	</analytic>
	<monogr>
		<title level="j">IAES International Journal of Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="956" to="965" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Method for Sentiment Analysis of Ukrainian-Language Reviews in E-Commerce Using RoBERTa Neural Network</title>
		<author>
			<persName><forename type="first">O</forename><surname>Zalutska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Molchanova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Sobko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Mazurets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Pasichnyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Barmak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Krak</surname></persName>
		</author>
		<idno type="DOI">10.15407/jai2024.02.085</idno>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">3387</biblScope>
			<biblScope unit="page" from="344" to="356" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">A Survey of Bayesian Network Structure Learning</title>
		<author>
			<persName><forename type="first">N</forename><surname>Kitson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Constantinou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Guo</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10462-022-10351-w</idno>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence Revue</title>
		<imprint>
			<biblScope unit="volume">56</biblScope>
			<biblScope unit="page" from="8721" to="8814" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Abusive Speech Detection Method for Ukrainian Language Used Recurrent Neural Network</title>
		<author>
			<persName><forename type="first">I</forename><surname>Krak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Zalutska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Molchanova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Mazurets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bahrii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Sobko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Barmak</surname></persName>
		</author>
		<idno type="DOI">10.31891/2307-5732-2024-331-17</idno>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="volume">3688</biblScope>
			<biblScope unit="page" from="16" to="28" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Identification of Racial Propaganda in Tweets Using Sentimental Analysis Models: A Comparative Study</title>
		<author>
			<persName><forename type="first">S</forename><surname>Mann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Yadav</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Rathee</surname></persName>
		</author>
		<idno>doi: 0.1007/978-981-99-3716-5_28</idno>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Networks and Systems</title>
		<imprint>
			<biblScope unit="volume">726</biblScope>
			<biblScope unit="page" from="327" to="341" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Hybrid Weakly Supervised Learning with Deep Learning Technique for Detection of Fake News from Cyber Propaganda</title>
		<author>
			<persName><forename type="first">L</forename><surname>Syed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Alsaeedi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Alhuri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Aljohani</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.array.2023.100309</idno>
	</analytic>
	<monogr>
		<title level="j">Array</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page">100309</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Graph-Based Multi-Information Integration Network with External News Environment Perception for Propaganda Detection</title>
		<author>
			<persName><forename type="first">X</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Ji</surname></persName>
		</author>
		<author>
			<persName><surname>Zh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><surname>Yang</surname></persName>
		</author>
		<idno type="DOI">10.1108/IJWIS-12-2023-0242</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Web Information Systems</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="195" to="212" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Robust Benchmark for Propagandist Text Detection and Mining High-Quality Data</title>
		<author>
			<persName><forename type="first">P</forename><surname>Ahmad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Ali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Elaffendi</surname></persName>
		</author>
		<idno type="DOI">10.3390/math11122668</idno>
	</analytic>
	<monogr>
		<title level="j">Mathematics</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page">2668</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Long Named Entity Recognition for Propaganda Detection and Beyond</title>
		<author>
			<persName><forename type="first">P</forename><surname>Przybyla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kaczynski</surname></persName>
		</author>
		<idno type="DOI">10.1007/s44196-024-00456-1</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference of the Spanish Society for Natural Language Processing</title>
				<meeting>the International Conference of the Spanish Society for Natural Language Processing</meeting>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Detecting propaganda in news articles using large language models</title>
		<author>
			<persName><forename type="first">D</forename><surname>Jones</surname></persName>
		</author>
		<idno type="DOI">10.13140/RG.2.2.34115.17446</idno>
	</analytic>
	<monogr>
		<title level="j">Engineering</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="1" to="12" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Method for Political Propaganda Detection in Internet Content Using Recurrent Neural Network Models Ensemble</title>
		<author>
			<persName><forename type="first">I</forename><surname>Krak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Didur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Molchanova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Mazurets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Sobko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Zalutska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Barmak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="volume">3806</biblScope>
			<biblScope unit="page" from="312" to="324" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Fine-Grained Propaganda Detection with Fine-Tuned BERT</title>
		<author>
			<persName><forename type="first">S</forename><surname>Yoosuf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Yang</surname></persName>
		</author>
		<idno type="DOI">10.18653/v1/D19-5011</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Second Workshop on Natural Language Processing for Internet Freedom: Censorship, Disinformation, and Propaganda</title>
				<meeting>the Second Workshop on Natural Language Processing for Internet Freedom: Censorship, Disinformation, and Propaganda</meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="87" to="91" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Synonym based feature expansion for Indonesian hate speech detection</title>
		<author>
			<persName><forename type="first">I</forename><surname>Ghozali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Sungkono</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sarno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Abdullah</surname></persName>
		</author>
		<idno type="DOI">10.11591/ijece.v13i1</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Electrical and Computer Engineering</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1105" to="1112" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Extending Context Window in Large Language Models with Segmented Base Adjustment for Rotary Position Embeddings</title>
		<author>
			<persName><forename type="first">L</forename><surname>Rongsheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Zheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Kim</surname></persName>
		</author>
		<idno type="DOI">10.3390/app14073076</idno>
	</analytic>
	<monogr>
		<title level="j">Applied Sciences</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page">3076</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
