Abstract

The articles consider the main approaches for improving the personalization of education in higher education institutions using adaptive educational systems based on information technology. The advantages and efficiency of the adaptive educational system with the use of modern information technologies are emphasized. The general scheme of construction of adaptive mobile educational environment by means of Internet technologies is developed, which has a certain functional structure - a set of functional algorithms that provide user interaction with the system that determines the use and role in the system and internal logic of data blocks. Listening to the functional requirements for creating an adaptive mobile educational environment, 4 main types of users (roles) of systems are identified and previous members of the system are analyzed. The system of distribution of users which is constructed on the principle of hierarchical structure is offered. It is likely that the GRPC communication protocol is required to ensure the highest communication speed for synchronous HTTP requests between servers. Pay attention to the development of server parts of the adaptive mobile educational environment on the correct deployment of services, with each request by ensuring the security of data access control system through service authentication and authorization. The administrative part of the adaptive mobile educational environment is described, the service of which should be as much as possible protected from external attacks. Of particular importance is the servers that deploy the most similar data. Find more data from the server part of the mobile educational environment for creating relational databases based on MS SQL Server, as well as a documentary database based on MongoDB. Considering the capabilities of the hosting environment, a generalized scheme of deployment of backend services of adaptive mobile environment is built. As a result of designing the internal structure of systems, there are basics of relatively known and prescribed algorithms, which indicate that the infrastructure scheme is based on three main algorithms, namely: the algorithm of authentication and authorization; algorithms for interaction with the file system (storage and retrieval of medical data); algorithms for downloading and analyzing completed tasks.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call