<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Century: Linking lexical data in the digital age. Proceedings
of eLex</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.33190/978</article-id>
      <title-group>
        <article-title>Lyubomyr Chyrun1,†, Alona Dorozhynska2,∗,†, and Sergiy Dorozhynskyy3,†</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Ivan Franko National University of Lviv, University 1</institution>
          ,
          <addr-line>79000 Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Kyiv University of Intellectual Property and Law</institution>
          ,
          <addr-line>210, Kharkivske Shosse, Kyiv, 02121</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Ukrainian Lingua-Information Fund of NAS of Ukraine</institution>
          ,
          <addr-line>3, Holosiivskyi avenue, Kyiv, 03039</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2015</year>
      </pub-date>
      <volume>11</volume>
      <fpage>11</fpage>
      <lpage>13</lpage>
      <abstract>
        <p>In a world saturated with a huge flow of data, not only the information itself has become important, but also its quality and reliability. Data digitization plays a key role in providing access to true and objective information. Careful processing and use of digitized data is a necessary element, a kind of filter for fighting the spread of misinformation and preserving the credibility of sources among the data flow. The article outlines the range of tasks, approaches and stages of text analysis technology development using dictionaries as an example. The research was conducted for the dictionaries. Based on the conceptual model, the structure of the XML document is built, which is proposed to be used as an intermediary between the paper version of the dictionary and its implementation as an online lexicographic system. In the future, it is planned to build a universal procedure for parsing texts of some fields. The most important stages in terms of information security are the database and website stages, because they are the only ones that can be compromised. That is why reliable security systems, such as quantum cryptographic systems, which are resistant to many types of attacks, should be used at these stages.</p>
      </abstract>
      <kwd-group>
        <kwd>Digitization</kwd>
        <kwd>1Cyber War</kwd>
        <kwd>parsing</kwd>
        <kwd>XML</kwd>
        <kwd>database</kwd>
        <kwd>digital space</kwd>
        <kwd>quantum cryptographіс protocols</kwd>
        <kwd>quantum security system</kwd>
        <kwd>website</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>misinformation, contributing to the creation of an objective and reliable image of the world around
us.</p>
      <p>Let's emphasize the importance of analyzing dictionaries, "because without them, neither the
development of various fields of knowledge, nor modern international communication in the most
diverse areas is possible" [4]. However, domestic lexicography still does not have a very rich
experience in creating electronic terminological dictionaries.</p>
      <p>To conduct the research, we chose the Dictionary of Ukrainian Biological Terminology (SUBT)
[1] and the Lexicon, as they have a rich structure.</p>
      <p>When analyzing research objects, certain questions and tasks arise.</p>
      <p>Among the tasks are the stages of researching the data format and text encoding elements.
Building the lexicographic structure of a dictionary and describing the technology of its syntactic
analysis is undoubtedly an important issue. It is also important to identify the processes that are the
least secure and require serious security solutions. As a result, we should get a generalized secure
system of data digitization.</p>
    </sec>
    <sec id="sec-2">
      <title>Basic technological stages</title>
      <p>The main aspect of data digitization is the formation of a general technology consisting of certain
stages and steps. Research occurs in the incrementally converted text on the website. Basic
technological stages: paper book, structure of the lexicographic system (L-systems), HTML, text
marking with XML tags according to the structure of its L-system (XML-text), conversion of
XMLtext into a database, website. This process includes steps that can be applied to a variety of paper
data, as the following sequence represents an efficient and versatile way to convert texts into digital
format.</p>
      <sec id="sec-2-1">
        <title>2.1. Paper book</title>
        <p>If the text is accessible in electronic format from the very beginning, then we work with it. Otherwise,
the process of scanning, detailed analysis and formatting is added. For convenience, the file can be
converted to Word doc format in order to do some text conversions.</p>
        <p>For example, we will demonstrate an effective approach for transforming a paper dictionary into
an online product "Dictionary of Ukrainian Biological Terminology" (SUBT) "Lexicon of Polish and
Ukrainian active phraseology" to an online digital dictionary.</p>
        <p>In particular, we had the text of the SBST and the Lexicon from the beginning in the form of a
PDF file. For the convenience of further work, these files were converted to Word doc format in
order to make some text conversions. Among these transformations, we note the following: the
disclosure of abbreviations of a certain type (for example: abrikós → abrikо#s and the like.;
replacement of stressed letters with a combination of two characters: «літера#». The following
replacements were made: á—a#, é—e#, и́—и#, í—i#, ó—o#, ý—y#, ї́—ї#, я—́я#, є́—є#, ю—́ю#, ы—́ы# (for
Cyrillic); ý—y# (for Latin). All dictionary articles were processed in this way.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Construction of a conceptual model of the lexicographic system</title>
        <p>In accordance with the theory of lexicographic systems [2], the general structure of the
dictionary article of the DUBT is revealed. The structure of the L-system is presented in the form:</p>
        <sec id="sec-2-2-1">
          <title>The following notation is used in this scheme: CС — dictionary article ЗТ_У — the title term is Ukrainian ТБі — terminological block</title>
          <p>ТК_Уi — terminological complex ukr.
Т_У — Ukrainian term
ГР— grammatical trailer
НО — homonym number
ММ — language marker (ukr)
ТК_Рi — terminological complex rus.
Т_Р — Russian term
ГР — grammatical trailer
ММ — language marker (rus)
СР — semantic trailer
ТК_Аi — terminological complex eng.
Т_А — English term
ГР — grammatical trailer
ММ — language marker (eng)
СР — semantic trailer
СМБі — semantic block
БТi — interpretation block
НТ — interpretation number
ТЛ — interpretation
CPТ — semantic trailer to ТЛ
БТСi — block of terminol. phrases
ТБСЛi — terminol. block of phrases
ТСК_Уi — terminological complex of
phrases ukr.</p>
          <p>ТС_У — terminological phrase ukr.
ГРС — grammatical remark of the phrase
ММ — language marker (укр)
ТСК_Рi — terminological complex of
phrases rus.</p>
          <p>ТС_Р — terminological phrase rus.
ММ — language marker (rus.)
ТСК_Аi — terminological complex of
phrases eng.</p>
          <p>ТС_А — terminological phrase eng.
ММ — language marker (eng)
БТСЛi — block of interp. of phrases
ТЛС — interpretation
НТЛС — number ТЛС
СИНi — synonymous block
СН — synonym
МС — synonym marker (син.)
БП — link block
ПБПi — subblock of links
САНТ — sender
САТi — recipient
МП — link marker (див.)
Example 1
adventy#vnyi (ros. adventy#vnyy, anhl. adventive) 1.Yakyi rozvyvaietʹsia ne z embrionalʹnykh
tkanyn tochky rostu, a iz starishykh chastyn roslyny; adventy#vna bry#nʹka dɪv. bry#nʹka: bry#nʹka
adventy#vna; adventy#vna embrioni#ia dɪv. embrioni#ia: embrioni#ia adventy#vna; adventy#vna
poliembrioni#ia dɪv. poliembrioni#ia: poliembrioni#ia nutseli#arna [adventy#vna]; adventy#vnyi
za#rodok dɪv. za#rodok: za#rodok adventy#vnyi; adventy#vnyi o#rhan dɪv. o#rhan: o#rhan
adventy#vnyi; adventy#vnyi pa#hin dɪv. pa#hin: pa#hin adventy#vnyi 2. Zanesena liudynoiu roslyna
v tu mistsevistʹ, de vona rani she ne rosla; adventy#vna rosly#na dɪv. rosly#na: rosly#na
adventy#vna; adventy#vna vyd dɪv. vyd: vyd adventy#vnyi.</p>
          <p>According to the structure of the dictionary article, we will highlight all the structural elements
ТБ [terminolohichnyi blok]: adventy#vnyi (ros. adventy#vnyi, anhl.
ТК_У [terminolohichnyi kompleks ukrainsʹkyi]:
ЗТ [zaholovnyi termin]: adventy#vnyi</p>
          <p>ТК_Р [terminolohichnyi kompleks rosiisʹkyi]: ros.
ММ [marker movy]:
Т_Р [termin rosiisʹkyi]: adventy#vnyi</p>
          <p>ТК_А [terminolohichnyi kompleks anhliisʹkyi]: anhl.
ММ [marker movy]:
Т_А [termin anhliisʹkyi]: adventive
adventive)
adventy#vnyi
adventy#vnyi</p>
          <p>ros.
adventive
anhl.</p>
          <p>СМБ [semantychnyi blok]: 1. Yakyi rozvyvaietʹsia ne z embrionalʹnykh tkanyn tochky rostu, a iz
starishykh chastyn roslyny; adventy#vna bry#nʹka dyv. bry#nʹka: bry#nʹka adventy#vna;
adventy#vna embrioni#ia dyv. embrioni#ia: embrioni#ia adventy#vna; adventy#vna poliembrioni#ia
dyv. poliembrioni#ia: poliembrioni#ia nutselia#rna [adventy#vna]; adventy#vnyi za#rodok dyv.
za#rodok: za#rodok adventy#vnyi; adventy#vnyi o#rhan dyv. o#rhan: o#rhan adventy#vnyi;
adventy#vnyi pa#hin dyv. pa#hin: pa#hin adventy#vnyi
2. Zanesena liudynoiu roslyna v tu mistsevistʹ, de vona ranishe ne rosla; adventy#vna rosly#na dyv.
rosly#na: rosly#na adventy#vna; adventy#vna vyd dyv. vyd: vyd adventy#vnyi.</p>
          <p>БТ1 [blok tlumachenʹ]: 1. Yakyi rozvyvaietʹsia ne z embrionalʹnykh tkanyn tochky rostu, a iz
starishykh chastyn roslyny; НТ [nomer tlumachennia]:
ТЛ1 [tlumachennia]: Yakyi rozvyvaietʹsia ne z embrionalʹnykh tkanyn tochky rostu, a iz starishykh
chastyn roslyny;</p>
          <p>БТ2 [blok tlumachenʹ]: 2. Zanesena liudynoiu roslyna v tu mistsevistʹ, de vona ranishe ne rosla;
НТ [nomer tlumachennia]:
ТЛ2 [tlumachennia]: Zanesena liudynoiu roslyna v tu mistsevistʹ, de vona ranishe ne rosla;
БП1 [blok posylanʹ]: adventy#vna bry#nʹka dyv. bry#nʹka: bry#nʹka adventy#vna; adventy#vna
embrioni#ia dyv. embrioni#ia: embrioni#ia adventy#vna; adventy#vna poliembrioni#ia dyv.
poliembrioni#ia: poliembrioni#ia nutselia#rna [adventy#vna]; adventy#vnyi za#rodok dyv.
za#rodok: za#rodok adventy#vnyi; adventy#vnyi o#rhan dyv. o#rhan: o#rhan adventy#vnyi;
adventy#vnyi pa#hin dyv. pa#hin: pa#hin adventy#vnyi
ПБП1 [pidblok posylanʹ]: adventy#vna bry#nʹka dyv. bry#nʹka: bry#nʹka adventy#vna;
ПБП2 [pidblok posylanʹ]: adventy#vna embrioni#ia dyv. embrioni#ia: embrioni#ia adventy#vna;
ПБП3 [pidblok posylanʹ]: adventy#vna poliembrioni#ia dyv. poliembrioni#ia: poliembrioni#ia
nutselia#rna [adventy#vna];
ПБП4 [pidblok posylanʹ]: adventy#vnyi za#rodok dyv. za#rodok: za#rodok adventy#vnyi;
ПБП5 [pidblok posylanʹ]: adventy#vnyi o#rhan dyv. o#rhan: o#rhan adventy#vnyi;
ПБП6 [pidblok posylanʹ]: adventy#vnyi pa#hin dyv. pa#hin: pa#hin adventy#vnyi
БП2 [blok posylanʹ]: adventy#vna rosly#na dyv. rosly#na: rosly#na adventy#vna; adventy#vna vyd
dyv. vyd: vyd adventy#vnyi.
ПБП1 [pidblok posylanʹ]: adventy#vna rosly#na dyv. rosly#na: rosly#na adventy#vna;
ПБП2 [pidblok posylanʹ]: adventy#vna vyd dyv. vyd: vyd adventy#vnyi.</p>
          <p>Each sub-block consists of an addressee1, a link marker and an addressee2.
ПБП2 [pidblok posylanʹ]: adventy#vna vyd dyv. vyd: vyd adventy#vnyi.
САНТ [adresant]: adventy#vna vyd
МП [marker posylanʹ]: dyv.
САТ [adresat]: vyd: vyd adventy#vnyi.
2.3. HTML
The next stage is the markup of the main HTML tags. This will further simplify the algorithm of the
program that forms the XML. All further work is based on XML file processing.</p>
          <p>The example shows the markup for dictionari. A container was immediately developed for the
Lexicon, as its structure is simple. And some steps in the work can be skipped.</p>
          <p>Example 2
&lt;B&gt;a#apa&lt;/B&gt; (&lt;I&gt;ros.&lt;/I&gt; aa#pa, &lt;I&gt;angl.&lt;/I&gt; aapa) 1. Bezlisyi, duzhe obvodnenyi,
hriadkovomocharnyi vyd bolota na pivnochi Yevrazii.</p>
          <p>&lt;B&gt;aba#ka&lt;/B&gt; (&lt;I&gt;ros.&lt;/I&gt; aba#ka, &lt;I&gt;angl.&lt;/I&gt; abacus) 1. Bahatorichna trav’ianysta roslyna
rodyny bananovykh, iaku kultyvuiutʹ u tropikakh; vykorystovuiutʹ u narodnomu hospodarstvi dlia
vyhotovlennia kanativ, motuzok, korabelʹnykh snastei toshcho.</p>
          <p>&lt;B&gt;abaksi#aľnyi&lt;/B&gt; (&lt;I&gt;ros.&lt;/I&gt; abaksia#ľnyĭ, &lt;I&gt;angl.&lt;/I&gt; abaxial) 1. Yakyi stosuietsia
nyzhnoi poverkhni lystovoho orhana.</p>
          <p>&lt;B&gt;abera#ntnyi&lt;/B&gt; (&lt;I&gt;ros.&lt;/I&gt; aberrа#ntnyĭ, &lt;I&gt;angl.&lt;/I&gt; aberrational) 1. Nezvychainyi,
shcho vidkhylyvsia vid normy. Aberantni pryklady parazytnykh vidnosyn predstavleni
hiperparazytyzmom.</p>
        </sec>
      </sec>
      <sec id="sec-2-3">
        <title>2.4. Marking text with XML tags according to its structure L-systems</title>
        <p>&lt;ТЛ&gt;Yakyi rozvyvaietʹsia ne z embrionalʹnykh tkanyn tochky rostu, a iz starishykh chastyn
roslyny&lt;/ТЛ&gt;
&lt;/БТ&gt;
&lt;БТ nomer="2"&gt;
&lt;НТ&gt;2&lt;/НТ&gt;
&lt;ТЛ&gt;Zanesena liudynoiu roslyna v tu mistsevistʹ, de vona ranishe ne rosla&lt;/ТЛ&gt;
&lt;/БТ&gt;
&lt;БП nomer="1"&gt;
&lt;САНТ&gt;adventy#vna bry#nʹka&lt;/САНТ&gt;
&lt;САТ&gt;bry#nʹka: bry#nʹka adventy#vna&lt;/САТ&gt;
&lt;МП&gt;dyv.&lt;/МП&gt;
&lt;/БП&gt;
&lt;БП nomer="2"&gt;
&lt;САНТ&gt;adventy#vna embrioni#ia&lt;/САНТ&gt;
&lt;САТ&gt;embrioni#ia: embrioni#ia adventy#vna&lt;/САТ&gt;
&lt;МП&gt;dyv.&lt;/МП&gt;
&lt;/БП&gt;
&lt;БП nomer="3"&gt;
&lt;САНТ&gt;adventy#vna poliembrioni#ia&lt;/САНТ&gt;
&lt;САТ&gt;poliembrioni#ia: poliembrioni#ia nutselia#rna [adventy#vna]&lt;/САТ&gt;
&lt;МП&gt;dyv.&lt;/МП&gt;
&lt;/БП&gt;
&lt;БП nomer="4"&gt;
&lt;САНТ&gt;adventy#vna za#rodok&lt;/САНТ&gt;
&lt;САТ&gt;za#rodok: za#rodok adventy#vnyi&lt;/САТ&gt;
&lt;МП&gt;dyv.&lt;/МП&gt;
&lt;/БП&gt;
&lt;БП nomer="5"&gt;
&lt;САНТ&gt;adventy#vnyi o#rhan&lt;/САНТ&gt;
&lt;САТ&gt;o#rhan: o#rhan adventy#vnyi&lt;/САТ&gt;
&lt;МП&gt;dyv.&lt;/МП&gt;
&lt;/БП&gt;
&lt;БП nomer="6"&gt;
&lt;САНТ&gt;adventy#vnyi pa#hin&lt;/САНТ&gt;
&lt;САТ&gt;pa#hin: pa#hin adventy#vnyi&lt;/САТ&gt;
&lt;МП&gt;dyv.&lt;/МП&gt;
&lt;/БП&gt;
&lt;БП nomer="7"&gt;
&lt;САНТ&gt;adventy#vna rosly#na&lt;/САНТ&gt;
&lt;САТ&gt;rosly#na: rosly#na adventy#vna&lt;/САТ&gt;
&lt;МП&gt;dyv.&lt;/МП&gt;
&lt;/БП&gt;
&lt;БП nomer="8"&gt;
&lt;САНТ&gt;adventy#vna vyd&lt;/САНТ&gt;
&lt;САТ&gt;vyd: vyd adventy#vnyi&lt;/САТ&gt;
&lt;МП&gt;dyv.&lt;/МП&gt;
&lt;/БП&gt;
&lt;/СМБ&gt;
&lt;/СС&gt;</p>
      </sec>
      <sec id="sec-2-4">
        <title>2.5. Conversion of XML-text into a database</title>
        <p>The creation of a lexicographic database is based on the processing of a strict and
meta-informationrich structure of the input XML file. Sequential traversal of all nodes of the hierarchical structure of
the XML-representation of dictionary articles made it possible to linearly translate them into the
form of software objects - instances of the class of dictionary articles, which are stored in an explicit
form in the LiteDB document type database. During this process, additional parameters for their
characterization were selected from the structurally marked text of the articles, which made it
possible to create an expanded index of register units and corresponding explanatory parts of this
dictionary.
3. Quantum-cryptographic systems for protecting digitized data
Protecting digitized data is a fundamental aspect of modern information management. In a world
where vast amounts of information are stored and processed electronically, the security of this data
is becoming critical. Digitized information is not only a key resource for businesses and
organizations, but also contains sensitive data such as personal customer information, financial data,
medical records, etc.</p>
        <p>Data protection involves a number of aspects, such as ensuring confidentiality, preventing
unauthorized changes (ensuring integrity), and ensuring that data is available to legitimate users.
With cybercrime and information leakage risks constantly evolving, the importance of data
protection is manifested in economic losses, legal consequences, loss of consumer confidence, and
preservation of organizations' reputation. In addition, regulatory requirements and statutory laws
oblige many companies to comply with specific standards for the protection of personal data and
confidential information. Non-compliance can result in severe sanctions and fines.</p>
        <p>The use of quantum key distribution (QKD) protocols in cryptography is determined by the need
to provide a higher level of security and resistance in the field of key exchange and protection of
confidential information. Quantum cryptography uses the principles of quantum mechanics to
generate and exchange keys, ensuring absolute confidentiality due to the principle of uncertainty of
quantum states. QKD protocols include methods for detecting any attacks or interception attempts,
making them particularly effective in the face of cyber threats and the growing interest in quantum
computing. These protocols not only provide a response to current cybersecurity challenges, but
 (Z )</p>
        <p>j
 ( X )</p>
        <p>j
also take into account the possible development of quantum technologies, such as quantum
computers, which may threaten traditional cryptographic methods. The use of QKD also helps to
ensure security at the physical level of the network, where ensuring that keys are inaccessible to
attackers becomes a key factor.</p>
        <p>The Twin Field protocol is an important tool in the field of protecting digitized data through the
use of quantum cryptography. If important improvements are applied, such as quantum channel
multiplexing and quantum identification, significant improvements in the security of quantum key
exchange can be achieved.</p>
        <p>The total number of quantum states required to multiplex N channels can be calculated by the
formula:</p>
        <p>Nt = 2N(M + L),
where Nt is the total number of quantum states required to multiplex all N channels. When
multiplexing quantum states from N channels, the total quantum state is transmitted to channel
Z:</p>
        <p>where is the quantum state transmitted in the j-th quantum channel using channel Z.
Similarly, the total quantum state is transmitted for channel X:
 Z</p>
        <p>N  (Z ) ,
  j1 j
 X</p>
        <p>  Nj1  j( X ) ,
where is the quantum state transmitted in the j-th quantum channel via channel X. The
formula for multiplexing quantum channels:
 ABCD  12
( 0 A  0 B  0 C  1 A  1 B  1 C )
.</p>
        <p>The use of quantum channel multiplexing contributes to the efficient transmission of
information, increasing bandwidth and optimizing the use of resources. This is especially true in
large networks where data transmission speed and reliability are important. Quantum identification,
using the principles of quantum mechanics, provides authentication of communication partners,
making it impossible to be monitored or attacked by illegitimate parties. This strengthens security
and trust in the exchange of quantum keys. Reducing the vulnerability to quantum espionage that
can arise from the physical interception of quantum bits is an important aspect of Twin Field QKD
security. This makes it an effective tool to protect against attacks involving the use of quantum
technologies.</p>
        <p>The Twin Field protocol in the context of forming a database for digitized data includes several
critical steps to ensure a high level of security and confidentiality. The initial step is to generate a
quantum key using the principles of quantum cryptography. During this process, a combination of
quantum particles determines a unique key that will be used to encrypt and decrypt the digitized
data. The resulting quantum key is used to encrypt the digitized data before it is transmitted over
open communication channels. It is important to note that even if the channels or the data itself is
intercepted, it remains encrypted and invaluable to unauthorized users without the appropriate
quantum key. One of the key aspects of the protocol is the use of quantum identification, which
provides authentication and authorization of communication partners. This makes it impossible to
be monitored or attacked by illegitimate parties, building trust in the individuals or systems
exchanging data. The quantum key used to protect the digitized data can be periodically updated to
further reduce the risk of hacking and increase system resilience. The storage and management of
these keys is a critical element, as the security of the entire system is largely determined by the
secrecy of the quantum key.
Acknowledgements
Digitized data, by its very nature, helps reduce misinformation through several mechanisms. First,
they provide the ability to verify information through metadata such as source and time of creation,
which provides the ability to verify its authenticity. However, they can be analyzed with the help of
various algorithms and artificial intelligence tools, which allows detecting possible anomalies and
changes in information that may indicate disinformation. The main criterion is that digital data is
available to a wide range of users, which, due to compliance with trusted sources, contributes to the
dissemination of truthful information. In addition, they provide an opportunity to compare data and
conduct data analysis to identify inconsistencies and refute false information facts.</p>
        <p>The presented stages are universal and can be applied to many types of paper publications,
because each of them has its own structure. An important process will be to correctly determine the
type of publication and build a conceptual model of the L-system, after which the technology will be
applied.</p>
        <p>In the future, it is planned to improve the basic technological stages in order to generalize the
transformation of texts of various types. Also develop XML structures (containers) for certain
industries and types of data.</p>
        <p>Declaration on Generative AI</p>
        <sec id="sec-2-4-1">
          <title>The authors have not employed any Generative AI tools.</title>
          <p>References
[1] D. M. Grodzinsky, L. O. Simonenko and other. Ukrainian biological terminology Dictionary. –
К.: КММ, 2012. 746 p.
[2] Linguistic and information studies: works of the Ukrainian language and information fund of
the NAS of Ukraine: in 5 volumes / V. A. Shyrokov et al. Vol. 1: Kyiv. 2018. 271 p.
[3] Shyrokov V. A. (Eds.) (2011). Computer lexicography. Kyiv.: Science opinion.
[4] Olga Karpova, Faina Kartashkova Lexicography and Terminology: A Worldwide Outlook.</p>
          <p>Cambridge : Cambridge Scholars Publishing, 2009. 205 p.
[5] Shyrokov V. А. etc. Linguistic and information studies: works of the Ukrainian Language and
Information Fund NAS of Ukraine: in 5 V. V. 5 : Virtualization of linguistic technologies. Kyiv.
Ukrainian Lingua-Information Fund of NAS of Ukraine. 2018. 239 p. URL:</p>
        </sec>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list />
  </back>
</article>