Academic literature on the topic 'Computer systems-Architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer systems-Architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer systems-Architecture"

1

Ma, K. "Review: Computer Systems Architecture." Computer Bulletin 46, no. 5 (September 1, 2004): 31. http://dx.doi.org/10.1093/combul/46.5.31-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Palagin, A. V. "Architecture of ontology-controlled computer systems." Cybernetics and Systems Analysis 42, no. 2 (March 2006): 254–64. http://dx.doi.org/10.1007/s10559-006-0061-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Nan, and Yuan Xie. "A Survey of Machine Learning for Computer Architecture and Systems." ACM Computing Surveys 55, no. 3 (April 30, 2023): 1–39. http://dx.doi.org/10.1145/3494523.

Full text
Abstract:
It has been a long time that computer architecture and systems are optimized for efficient execution of machine learning (ML) models. Now, it is time to reconsider the relationship between ML and systems and let ML transform the way that computer architecture and systems are designed. This embraces a twofold meaning: improvement of designers’ productivity and completion of the virtuous cycle. In this article, we present a comprehensive review of the work that applies ML for computer architecture and system design. First, we perform a high-level taxonomy by considering the typical role that ML techniques take in architecture/system design, i.e., either for fast predictive modeling or as the design methodology. Then, we summarize the common problems in computer architecture/system design that can be solved by ML techniques and the typical ML techniques employed to resolve each of them. In addition to emphasis on computer architecture in a narrow sense, we adopt the concept that data centers can be recognized as warehouse-scale computers; sketchy discussions are provided in adjacent computer systems, such as code generation and compiler; we also give attention to how ML techniques can aid and transform design automation. We further provide a future vision of opportunities and potential directions and envision that applying ML for computer architecture and systems would thrive in the community.
APA, Harvard, Vancouver, ISO, and other styles
4

Clements, Alan. "TRON Project 1987: Open-architecture computer systems." Microprocessors and Microsystems 13, no. 5 (June 1989): 351. http://dx.doi.org/10.1016/0141-9331(89)90094-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Clements, Alan. "TRON project 1988: open-architecture computer systems." Microprocessors and Microsystems 13, no. 8 (October 1989): 492. http://dx.doi.org/10.1016/0141-9331(89)90101-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pelc, Mariusz, and Dawid Galus. "Adaptation Architecture for Self-Healing Computer Systems." International Journal of Software Engineering and Knowledge Engineering 27, no. 05 (June 2017): 791–815. http://dx.doi.org/10.1142/s0218194017500292.

Full text
Abstract:
Nowadays, information/data security and availability are of utmost importance. However, due to the fact that security is a process rather than a state, there is an increasing demand for technologies or architectural solutions that would allow a computer system to adjust its level of security in response to changes in its environmental/network characteristics. In this paper, an architecture for a self-managing adaptive router/firewall has been proposed to facilitate an intelligent and real-time self-protection of a computer system. We also show how the proposed architecture might be used to control other system mechanisms or resources (for example, RAM).
APA, Harvard, Vancouver, ISO, and other styles
7

Milutinovic, Fura, Helbig, and Linn. "Architecture/Compiler Synergism in GaAs Computer Systems." Computer 20, no. 5 (May 1987): 72–93. http://dx.doi.org/10.1109/mc.1987.1663566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schill, Alexander. "Systems Application Architecture." Computer Communications 14, no. 9 (November 1991): 573. http://dx.doi.org/10.1016/0140-3664(91)90116-i.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Raghavan, SV. "Systems network architecture." Computer Communications 18, no. 1 (January 1995): 56. http://dx.doi.org/10.1016/0140-3664(95)90075-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Aken, B. R. "Large systems and Enterprise Systems Architecture." IBM Systems Journal 28, no. 1 (1989): 4–14. http://dx.doi.org/10.1147/sj.281.0004.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer systems-Architecture"

1

Umeh, Njideka Adaku. "Security architecture methodology for large net-centric systems." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.mst.edu/thesis/Umeh_09007dcc8049b3f0.pdf.

Full text
Abstract:
Thesis (M.S.)--University of Missouri--Rolla, 2007.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed December 6, 2007) Includes bibliographical references (p. 60-63).
APA, Harvard, Vancouver, ISO, and other styles
2

Cockton, Gilbert. "Architecture and abstraction in interactive systems." Thesis, Heriot-Watt University, 1992. http://hdl.handle.net/10399/1460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Almeida, Jose Carlos Alves de. "Software architecture for distributed real-time embedded systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA355809.

Full text
Abstract:
Thesis (M.S. in Computer Science) Naval Postgraduate School, September 1998.
"September 1998." Thesis advisor(s): Man-Tak Shing, Michael Holden. Includes bibliographical references (p. 121-123). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
4

Azar, Iyad Bahgat. "A vision architecture for integrated manufacturing systems." Thesis, Loughborough University, 1989. https://dspace.lboro.ac.uk/2134/27051.

Full text
Abstract:
This thesis introduces a conceptual multi-layered reference model to deal with representing information in a visual scene and to relate this data to similar data structures used within manufacturing processes. In this model, information is processed by a set of algorithms organised within layers of hierarchy. The bottom layer deals directly with data collected by the sensors and the top-most layer offers an interface to the different related manufacturing processes. The building elements of the model and the functionality of each layer are examined with respect to different potential implementation. Through a study of typical vision problems, the thesis shows how conventional image processing solution can be re-implemented in a compatible way with the reference model with the advantage of making use of standard algorithms and development tools. The thesis also examines the impact of using machine vision, based on layered model with other manufacturing entities, and the resulting consequences on computer-integrated manufacturing strategy.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Mingsheng. "A new architecture of multimedia distributed systems." Thesis, McGill University, 1998. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=20137.

Full text
Abstract:
This paper proposes a now architecture for distributed multimedia systems, we called it MSZ, which allows users to access multimedia documents in the system. MSZ assumes a system consisting of a not of client machines and a got of server machines. All of these machines are connected through the Internet. A user can ask for a document to be played with the desired quality of service from any server; MSZ is responsible for selecting the beat server that is able to deliver the document to the user most efficiently. The best server satisfies the following properties: (1) It stores the requested document and has the ability to deliver the document to the user (the ability includes its free CPU time and free bandwidth and free memory space). (2) The server is much closer to the user geographically in comparison to other servers in the system, and the related network path has the most available resource, which is more than the service requires. (3) The server has a lighter system load compared to other servers.
MSZ is able to minimize the response time and optimize the service quality as much as possible (the users are rejected only when the requested document is unavailable in all servers or servers are all loaded at maximum, or the communication network resource is less than the service required). Also MSZ has the self-learn ability. The more it is used, the better it works.
The system has the ability to detect any degradation in service and to automatically recover during the presentation of the document. A server's failure doesn't affect the whole system and it is very easy for the system to add and remove a server. Generally, MSZ offers a better service to users with less blocking time, less cost and higher quality service.
APA, Harvard, Vancouver, ISO, and other styles
6

Nicolaou, Cosmos Andrea. "A distributed architecture for multimedia communication systems." Thesis, University of Cambridge, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.385935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kulkarni, Nitin Y. "Application of expert systems in landscape architecture." Thesis, Virginia Tech, 1989. http://hdl.handle.net/10919/43899.

Full text
Abstract:

Application of artificial intelligence (Al) has been a topic of interest among researchers for the past decade or more. Years of research in the commercial application of Al, availability of hardware support for Al application and affordability of software and hardware has generated a lot of interest in this field and brought this technology within the reach of micro-computer based users. The commercial impact of AI is due to expert systems (ESs). ES technology is a collection of methods and techniques for constructing human-machine systems with specialized problem solving expertise.

This project explores the application of ESs in landscape architecture by developing a prototype ES and testing implications of its use with designers while working on a hypothetical problem in a studio environment. The development process helps identify the typical difficulties of such an application, to uncover technical problems, and to identify areas needing further research.

The project aims at building an ES that provides very limited preliminary data and design guidelines to initialize the design process and keeps track of the most fundamental issues necessary for planning, thus acting as an expert and assistant simultaneously. The idea is to explore the possibility of applying ESs to facilitate the design process so that designers may concentrate on other important aspects of design which include intuitive judgement about qualitative aspects.


Master of Landscape Architecture
APA, Harvard, Vancouver, ISO, and other styles
8

Shepherd, Simon John. "A distributed security architecture for large scale systems." Thesis, University of Plymouth, 1992. http://hdl.handle.net/10026.1/2143.

Full text
Abstract:
This thesis describes the research leading from the conception, through development, to the practical implementation of a comprehensive security architecture for use within, and as a value-added enhancement to, the ISO Open Systems Interconnection (OSI) model. The Comprehensive Security System (CSS) is arranged basically as an Application Layer service but can allow any of the ISO recommended security facilities to be provided at any layer of the model. It is suitable as an 'add-on' service to existing arrangements or can be fully integrated into new applications. For large scale, distributed processing operations, a network of security management centres (SMCs) is suggested, that can help to ensure that system misuse is minimised, and that flexible operation is provided in an efficient manner. The background to the OSI standards are covered in detail, followed by an introduction to security in open systems. A survey of existing techniques in formal analysis and verification is then presented. The architecture of the CSS is described in terms of a conceptual model using agents and protocols, followed by an extension of the CSS concept to a large scale network controlled by SMCs. A new approach to formal security analysis is described which is based on two main methodologies. Firstly, every function within the system is built from layers of provably secure sequences of finite state machines, using a recursive function to monitor and constrain the system to the desired state at all times. Secondly, the correctness of the protocols generated by the sequences to exchange security information and control data between agents in a distributed environment, is analysed in terms of a modified temporal Hoare logic. This is based on ideas concerning the validity of beliefs about the global state of a system as a result of actions performed by entities within the system, including the notion of timeliness. The two fundamental problems in number theory upon which the assumptions about the security of the finite state machine model rest are described, together with a comprehensive survey of the very latest progress in this area. Having assumed that the two problems will remain computationally intractable in the foreseeable future, the method is then applied to the formal analysis of some of the components of the Comprehensive Security System. A practical implementation of the CSS has been achieved as a demonstration system for a network of IBM Personal Computers connected via an Ethernet LAN, which fully meets the aims and objectives set out in Chapter 1. This implementation is described, and finally some comments are made on the possible future of research into security aspects of distributed systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Matthews, Stephen W. Miller Kenneth H. "An open architecture for defense virtual environment training systems /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FMatthews.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2003.
Thesis advisor(s): Rudolph P. Darken, Joseph A. Sullivan. Includes bibliographical references (p. 131-134). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
10

Bhat, Vidya G. "Domain specific architecture development for enterprise systems based on common object request broker architecture (CORBA)." FIU Digital Commons, 1999. http://digitalcommons.fiu.edu/etd/1673.

Full text
Abstract:
Large business organizations with enterprise wide systems have followed an ad hoc incremental growth pattern. They are either monolithic, that are difficult to replace and maintain, or are components with little or no interoperability between them. Such systems suffer from lack of uniformity and definition in their information technology infrastructure. To migrate from this state, to systems that are extensible, interoperable and non-redundant in functionality it is very important to focus on the architecture. We use the healthcare enterprise system as a case study for the purpose of this thesis. It is indeed difficult, if not impossible to construct the overall architecture of the system without identifying the individual components of the system. Hence we follow an incremental methodology in identifying and developing each component. One such component is Order management, which is an essential component of a healthcare information system that offers enterprise wide functionality.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer systems-Architecture"

1

Newman, Robert M. Computer systems architecture. Exeter [UK]: Crucial, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lacy, M. Understanding computer systems architecture. London: DP Publications, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Systems architecture. 3rd ed. Boston, Mass: Course Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Andleigh, Prabhat K. UNIX systems architecture. Englewood Cliffs, N.J: Prentice Hall, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Scott, John. IBM: Systems Applications Architecture. New York: Prentice Hall, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Omondi, Amos, and Stanislav Sedukhin, eds. Advances in Computer Systems Architecture. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/13479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Choi, Lynn, Yunheung Paek, and Sangyeun Cho, eds. Advances in Computer Systems Architecture. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74309-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Srikanthan, Thambipillai, Jingling Xue, and Chip-Hong Chang, eds. Advances in Computer Systems Architecture. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11572961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yew, Pen-Chung, and Jingling Xue, eds. Advances in Computer Systems Architecture. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b100354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jesshope, Chris, and Colin Egan, eds. Advances in Computer Systems Architecture. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11859802.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer systems-Architecture"

1

Cole, Robert. "Network Systems Architecture." In Computer Communications, 104–18. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18271-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weik, Martin H. "open systems architecture." In Computer Science and Communications Dictionary, 1145. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bhushan, Abhay K., and Dennis G. Frahmann. "Xerox Network Systems Architecture." In Computer Network Architectures and Protocols, 417–47. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pozefsky, Diane P., Daniel A. Pitt, and James P. Gray. "IBM’s Systems Network Architecture." In Computer Network Architectures and Protocols, 449–509. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Weik, Martin H. "Open Systems Interconnection architecture." In Computer Science and Communications Dictionary, 1146. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Encarnação, José L., Rolf Lindner, and Ernst G. Schlechtendahl. "The Architecture of CAD Systems." In Computer Aided Design, 165–221. Berlin, Heidelberg: Springer Berlin Heidelberg, 1990. http://dx.doi.org/10.1007/978-3-642-84054-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Ruby B. "Processor Architecture for Trustworthy Computers." In Advances in Computer Systems Architecture, 1–2. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11572961_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hill, Gillian. "An architecture for complex systems." In Lecture Notes in Computer Science, 189–201. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0025044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fuchs-Kittowski, Frank, and Daniel Faust. "Architecture of Mobile Crowdsourcing Systems." In Lecture Notes in Computer Science, 121–36. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10166-8_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bancilhon, François. "Object database systems: Functional architecture." In Lecture Notes in Computer Science, 163–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/3-540-57342-9_72.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer systems-Architecture"

1

Rao, Kuntam Babu. "Computer systems architecture vs quantum computer." In 2017 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2017. http://dx.doi.org/10.1109/iccons.2017.8250619.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Session CA: Computer architecture & embedded systems." In Systems (ICCES). IEEE, 2011. http://dx.doi.org/10.1109/icces.2011.6141002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Goddard, Iain, Hui Chao, and Mark Skalabrin. "Scalable computer architecture for digital vascular systems." In Medical Imaging '98, edited by Yongmin Kim and Seong K. Mun. SPIE, 1998. http://dx.doi.org/10.1117/12.312503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Technical session CA: Computer architecture and embedded systems." In 2008 International Conference on Computer Engineering & Systems. IEEE, 2008. http://dx.doi.org/10.1109/icces.2008.4772955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhou, Jie, and Jim Alves-Foss. "Architecture-based refinements for secure computer systems design." In the 2006 International Conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1501434.1501453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tabeling, P., and B. Grone. "Integrative architecture elicitation for large computer based systems." In Proceedings. 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems. IEEE, 2005. http://dx.doi.org/10.1109/ecbs.2005.46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ramachandran, Umakishore, and William D. Leahy. "An integrated approach to teaching computer systems architecture." In the 2007 workshop. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1275633.1275641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pacuraru, Raluca olguta, and Gheorghe Grecu. "ARCHITECTURE AND DESIGN OF COMPUTER-ASSISTED INSTRUCTION SYSTEMS." In eLSE 2013. Carol I National Defence University Publishing House, 2013. http://dx.doi.org/10.12753/2066-026x-13-157.

Full text
Abstract:
The multitude of innovations which assault us in all areas of life made necessary "the education for change". Through education, people must ensure the ability to develop the capacity to understand and respond appropriately to various challenges from society, to become agents of their own training, to organize and structure their own knowledge. As time goes by, it becomes more and more obvious the need for diversification and institutional personalization in Romanian education system, diversification of types of study programs, the need to promote lifelong learning and reform the existing legislation in this area. From the perspective of the education system, the evolution towards the knowledge society is a revolution in how people think the whole process of education - both as management as well as structure. In higher education is a tendency to an "education of the masses" - undergraduate studies, followed by higher cycles - master's degree, doctoral studies. It also tends to lifelong learning, appreciating the return in the educational process should be at least every five years to ensure competence in a particular field. In the knowledge society, the very paradigm of education has changed, the role of ICT has become more and more important and present in an increasingly wide range of activities. Nowadays the use of an e-learning system is a must for any university that wants to align to the existing trends and have a high quality of educational process. More than that, computer-assisted instruction systems (commonly called today "e-learning platforms") are also used for lifelong learning - regardless of whether it is done in universities, specialized organizations or at job. This paper aims to deal with some aspects of the design and architecture of computer-assisted instruction systems, so that choosing, implementing and developing such a system could have a well-documented starting point.
APA, Harvard, Vancouver, ISO, and other styles
9

Merchant, A. "Session details: Systems/architecture." In SIGMETRICS07: ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. New York, NY, USA: ACM, 2007. http://dx.doi.org/10.1145/3246554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dally, W. J. "Communication-oriented computer architecture: data choreography." In Proceedings Innovative Architecture for Future Generation High-Performance Processors and Systems. IEEE, 1997. http://dx.doi.org/10.1109/iwia.1997.670414.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer systems-Architecture"

1

Zhou, Jie, and Jim Alves-Foss. Architecture-Based Refinements for Secure Computer Systems Design. Fort Belvoir, VA: Defense Technical Information Center, January 2006. http://dx.doi.org/10.21236/ada459287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wysochanski, D. Declarative Public Extension Key for Internet Small Computer Systems Interface (iSCSI) Node Architecture. RFC Editor, April 2007. http://dx.doi.org/10.17487/rfc4850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tsidylo, Ivan M., Hryhoriy V. Tereshchuk, Serhiy V. Kozibroda, Svitlana V. Kravets, Tetiana O. Savchyn, Iryna M. Naumuk, and Darja A. Kassim. Methodology of designing computer ontology of subject discipline by future teachers-engineers. [б. в.], September 2019. http://dx.doi.org/10.31812/123456789/3249.

Full text
Abstract:
The article deals with the problem of the methodology of designing computer ontology of the subject discipline by the future teachers-engineers in the field of computer technologies. The scheme of ontology of the subject discipline is presented in which the set of concepts of the future computer ontology and the set of relations between them are represented. The main criteria of the choice of systems of computer ontologies for designing computer ontology of the subject discipline: software architecture and tools development; interoperability; intuitive interface are established. The selection of techniques for designing ontologies using computer ontology systems is carried out. The algorithm of designing computer ontology of the subject discipline by the future teachers-engineers in the field of computer technologies is proposed.
APA, Harvard, Vancouver, ISO, and other styles
4

Tkachuk, Viktoriia V., Vadym P. Shchokin, and Vitaliy V. Tron. The Model of Use of Mobile Information and Communication Technologies in Learning Computer Sciences to Future Professionals in Engineering Pedagogy. [б. в.], November 2018. http://dx.doi.org/10.31812/123456789/2668.

Full text
Abstract:
Research goal: the research is aimed at developing a model of use of mobile ICT in learning Computer Sciences to future professionals in Engineering Pedagogy. Object of research is the model of use of mobile ICT in learning Computer Sciences to future professionals in Engineering Pedagogy. Results of the research: the developed model of use of mobile ICT as tools of learning Computer Sciences to future professionals in Engineering Pedagogy is based on the competency-based, person-centered and systemic approaches considering principles of vocational education, general didactic principles, principles of Computer Science learning, and principles of mobile learning. It also takes into account current conditions and trends of mobile ICT development. The model comprises four blocks: the purpose-oriented block, the content-technological block, the diagnostic block and the result-oriented block. According to the model, the learning content of Computer Sciences consists of 5 main units: 1) Fundamentals of Computer Science; 2) Architecture of Modern Computers; 3) Fundamentals of Algorithmization and Programming; 4) Software of Computing Systems; 5) Computer Technologies in the Professional Activity of Engineer-pedagogues.
APA, Harvard, Vancouver, ISO, and other styles
5

Osadchyi, Viacheslav V., Hanna Y. Chemerys, Kateryna P. Osadcha, Vladyslav S. Kruhlyk, Serhii L. Koniukhov, and Arnold E. Kiv. Conceptual model of learning based on the combined capabilities of augmented and virtual reality technologies with adaptive learning systems. [б. в.], November 2020. http://dx.doi.org/10.31812/123456789/4417.

Full text
Abstract:
The article is devoted to actual problem of using modern ICT tools to increase the level of efficiency of the educational process. The current state and relevance of the use of augmented reality (AR) and virtual reality (VR) technologies as an appropriate means of improving the educational process are considered. In particular, attention is paid to the potential of the combined capabilities of AR and VR technologies with adaptive learning systems. Insufficient elaboration of cross-use opportunities for achieving of efficiency of the educational process in state-of-the-art research has been identified. Based on analysis of latest publications and experience of using of augmented and virtual reality technologies, as well as the concept of adaptive learning, conceptual model of learning based on the combined capabilities of AR and VR technologies with adaptive learning systems has been designed. The use of VR and AR technologies as a special information environment is justified, which is applied in accordance with the identified dominant type of students' thinking. The prospects of using the proposed model in training process at educational institutions for the implementation and support of new teaching and learning strategies, as well as improving learning outcomes are determined by the example of such courses as “Algorithms and data structures”, “Computer graphics and three-dimensional modeling”, “Circuit Engineering”, “Computer Architecture”.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography