PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Optimization of computer ontologies for e-courses in information and communication technologies

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
A methodology is proposed for modifying computer ontologies (CO) for electronic courses (EC) in the field of information and communication technologies (ICT) for universities, schools, extracurricular institutions, as well as for the professional retraining of specialists. The methodology includes the modification of CO by representing the formal ontograph of CO in the form of a graph and using techniques for working with the graph to find optimal paths on the graph using applied software (SW). A genetic algorithm (GA) is involved in the search for the optimal CO. This will lead to the division of the ontograph into branches and the ability to calculate the best trajectory in a certain sense through the EC educational material, taking into account the syllabus. An example is considered for the ICT course syllabus in terms of a specific topic covering the design and use of databases. It is concluded that for the full implementation of this methodology, a tool is needed that automates this procedure for developing EC and/or electronic textbooks. An algorithm and a prototype of software tools are also proposed, integrating machine methods of working with CO and graphs.
Twórcy
  • Eurasian National University, Astana, Kazakhstan
  • Luhansk Taras Shevchenko National University, Poltava, Ukraine
  • National University of Life and Environmental Sciences of Ukraine, Kyiv, Ukraine
  • Yessenov University, Aktau, Kazakhstan
  • State University of Trade and Economics, Kyiv, Ukraine
  • State University of Trade and Economics, Kyiv, Ukraine
  • Yessenov University, Aktau, Kazakhstan
  • State University of Trade and Economics, Kyiv, Ukraine
Bibliografia
  • [1] Monika Rani, Riju Nayak, O.P. Vyas, “An ontology-based adaptive personalized e-learning system, assisted by software agents on cloud storage,” Knowledge-Based Systems, Volume 90, 2015, Pages 33-48, ISSN 0950-7051, doi:10.1016/j.knosys.2015.10.002, 33-48.
  • [2] A. Ameen, K. U. R. Khan and B. P. Rani, “Creation of Ontology in Education Domain,” 2012 IEEE Fourth International Conference on Technology for Education, Hyderabad, India, 2012, pp. 237-238, doi:10.1109/T4E.2012.50
  • [3] Uschold, M., & Gruninger, M., “Ontologies: Principles, methods and applications,” The Knowledge Engineering Review, 11(2), 93-136, doi:10.1017/S0269888900007797
  • [4] Sabitova, B.SH. Razakhova, L.U. Taimuratova, al etc., “The use of ontological modeling in the preparation of electronic courses in the field of information and communication technologies”, Journal of Theoretical and Applied Information Technology, Vol.101, No 15, PP. 5999-6013.
  • [5] Tikhonov, U., Lakhno, V., Skliarenko, E., Stepanenko, O., & Dvirnyi, K., “Development of ontological approach in e-learning when studying information technologies,” Eastern-European Journal of Enterprise Technologies, 5(2 (83), 13–20, doi:10.15587/1729-4061.2016.79230
  • [6] Palagin, A.V., “An Ontological Conception of Informatization of Scientific Investigations,” Cybern Syst Anal 52, 1-7 (2016), doi:10.1007/s10559-016-9793-6
  • [7] Palagin, A., Petrenko, N.G., Velychko, V., Malakhov, K., & Tikhonov, Y.L., “To the problem of "The Instrumental complex for ontological engineering purpose" software system design,” ArXiv, abs/1802.03544.
  • [8] Duque-Ramos, A., Fernandez-Breis, J.T., Iniesta, M., Dumontier, M., Aranguren, M.E., Schulz, S., Aussenac-Gilles, N., Stevens, R. 2013. “Evaluation of the OQuaRE framework for ontology quality,” Expert Systems with Applications, 2013. № 40. P. 2696-2703.
  • [9] Burton-Jones, A., Storey, V., Sugumaran, V., Ahluwalia, P., “A semiotic metrics suite for assessing the quality of ontologies,” Data & Knowledge Engineering, 2005. Vol. 55. № 1. P. 84-102.
  • [10] Wang, Y., Bao, J., Haase, P., Qi, G., “Evaluating Formalisms for Modular Ontologies in Distributed Information Systems,” In: Marchiori, M., Pan, J.Z., Marie, C.d.S. (eds) Web Reasoning and Rule Systems. RR 2007. Lecture Notes in Computer Science, vol. 4524. Springer, Berlin, Heidelberg, doi:10.1007/978-3-540-72982-2_13
  • [11] Tartir, S., Arpinar, I., Moore, M., Sheth, A., Aleman-Meza, B., “OntoQA: metric-based ontology quality analysis,” In: Proceedings of the Workshop on Knowledge Acquisition from Distributed, Autonomous, Semantically Heterogeneous Data and Knowledge Sources (KADASH), Citeseer, 2006.
  • [12] Gangemi, A., Catenacci, C., Ciaramita, M., Lehmann, J., “Modelling Ontology Evaluation and Validation,” In: Sure, Y., Domingue, J. (eds) The Semantic Web: Research and Applications. ESWC 2006. Lecture Notes in Computer Science, vol 4011. Springer, Berlin, Heidelberg, doi:10.1007/11762256_13
  • [13] Darrel Whitley, “A Genetic Algorithm Tutorial;” November 10, 1993; Technical Report CS-93-103 (Revised); Department of Computer Science, Colorado State University, Fort Collins, US.
  • [14] Eremeev, A.V., “Modeling and Analysis of Genetic Algorithm with Tournament Selection,” In: Fonlupt, C., Hao, JK., Lutton, E., Schoenauer, M., Ronald, E. (eds) Artificial Evolution. AE 1999. Lecture Notes in Computer Science, vol 1829. Springer, Berlin, Heidelberg, doi:10.1007/10721187_6
  • [15] G. Alexandru-Lucian and A. Iftene, “Using a genetic algorithm for optimizing the similarity aggregation step in the process of ontology alignment,” 9th RoEduNet IEEE International Conference, Sibiu, Romania, 2010, pp. 118-122.
  • [16] J. Wang, Z. Ding and C. Jiang, “GAOM: Genetic Algorithm Based Ontology Matching,” 2006 IEEE Asia-Pacific Conference on Services Computing (APSCC'06), Guangzhou, China, 2006, pp. 617-620, doi:10.1109/APSCC.2006.59
  • [17] V. Lakhno, V. Malyukov, B. Akhmetov, B. Yagaliyeva, O. Kryvoruchko and A. Desiatko, “University Distributed Computer Network Vulnerability Assessment,” 2023 IEEE International Conference on Smart Information Systems and Technologies (SIST), Astana, Kazakhstan, 2023, pp. 141-144, doi:10.1109/SIST58284.2023.10223501
  • [18] Valerii Lakhno, Zhuldyz Alimseitova, Yerbolat Kalaman, Olena Kryvoruchko, Alona Desiatko, and Serhii Kaminskyi, “Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object,” International Journal of Electronics and Telecommunications Volume 69, Issue 3, Pages 475-483, doi:10.24425/ijet.2023.146495
  • [19] Lakhno, V. et al. (2023), “The Model of Server Virtualization System Protection in the Educational Institution Local Network,” In: Shakya, S., Papakostas, G., Kamel, K.A. (eds) Mobile Computing and Sustainable Informatics. Lecture Notes on Data Engineering and Communications Technologies, vol 166. Springer, Singapore, doi:10.1007/978-981-99-0835-6_33
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2024).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-4220be18-7fcb-40f3-a3a2-772256cd2659
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.