Auswahl der wissenschaftlichen Literatur zum Thema „Mutual exclusion constraints“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Mutual exclusion constraints" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Mutual exclusion constraints"

1

Giua, A., F. Dicesare und M. Silva. „Petri Net Supervisors for Generalized Mutual Exclusion Constraints“. IFAC Proceedings Volumes 26, Nr. 2 (Juli 1993): 379–82. http://dx.doi.org/10.1016/s1474-6670(17)48493-x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Barbara, Daniel, Hector Garcia-Molina und Annemarie Spauster. „Increasing availability under mutual exclusion constraints with dynamic vote reassignment“. ACM Transactions on Computer Systems 7, Nr. 4 (November 1989): 394–426. http://dx.doi.org/10.1145/75104.75107.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Ma, Ziyue, Zhiwu Li und Alessandro Giua. „Petri net controllers for Generalized Mutual Exclusion Constraints with floor operators“. Automatica 74 (Dezember 2016): 238–46. http://dx.doi.org/10.1016/j.automatica.2016.07.042.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Ma, Ziyue, Zhiwu Li und Alessandro Giua. „Design of Optimal Petri Net Controllers for Disjunctive Generalized Mutual Exclusion Constraints“. IEEE Transactions on Automatic Control 60, Nr. 7 (Juli 2015): 1774–85. http://dx.doi.org/10.1109/tac.2015.2389313.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Abbott, Barbara. „THE HUMAN SEMANTIC POTENTIAL: SPATIAL LANGUAGE AND CONSTRAINED CONNECTIONISM.Terry Regier. Cambridge, MA: MIT Press, 1996. Pp. xvi + 220. $37.50 paper.“ Studies in Second Language Acquisition 19, Nr. 4 (Dezember 1997): 517–18. http://dx.doi.org/10.1017/s027226319722406x.

Der volle Inhalt der Quelle
Annotation:
The semantic potential referred to in the title of this book is the ability of humans to learn the (closed-class) terms for basic spatial relations, such as (for English) onto, above, and through. Regier presents a modified connectionist model of this ability designed to address three questions: (a) What kind of system can learn spatial terms? (b) How can this system function without negative evidence? and (c) What are the universal constraints on learnable spatial terms? The answers suggested to these questions are: (a) a modified connectionist network—one which incorporates structural constraints motivated by human physiology; (b) the assumption of mutual exclusion, that is, that different terms have mutually exclusive denotations; and (c) the structural constraints that are incorporated into the network.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

ZhiWu Li, MingMing Yan und MengChu Zhou. „Synthesis of Structurally Simple Supervisors Enforcing Generalized Mutual Exclusion Constraints in Petri Nets“. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 40, Nr. 3 (Mai 2010): 330–40. http://dx.doi.org/10.1109/tsmcc.2009.2037824.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Fujita, Kohei, und Toshimitsu Ushio. „Optimal Control of Colored Timed Petri Nets Under Generalized Mutual Exclusion Temporal Constraints“. IEEE Access 10 (2022): 110849–61. http://dx.doi.org/10.1109/access.2022.3216043.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Gharbi, Atef, Hamza Gharsellaoui und Mohamed Khalgui. „Real-Time Reconfigurations of Embedded Control Systems“. International Journal of System Dynamics Applications 5, Nr. 3 (Juli 2016): 71–93. http://dx.doi.org/10.4018/ijsda.2016070104.

Der volle Inhalt der Quelle
Annotation:
This paper deals with the study of the reconfiguration of embedded control systems with safety following component-based approaches from the functional level to the operational level. The authors define the architecture of the Reconfiguration Agent which is modelled by nested state machines to apply local reconfigurations. They propose in this journal paper technical solutions to implement the whole agent-based architecture, by defining UML meta-models for both Control Components and also agents. To guarantee safety reconfigurations of tasks at run-time, they define service and reconfiguration processes for tasks and use the semaphore concept to ensure safety mutual exclusions. As a method to ensure the scheduling between periodic tasks with precedence and mutual exclusion constraints, the authors apply the priority ceiling protocol.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Chen, Y., B. W. Wah und C. Hsu. „Temporal Planning using Subgoal Partitioning and Resolution in SGPlan“. Journal of Artificial Intelligence Research 26 (06.08.2006): 323–69. http://dx.doi.org/10.1613/jair.1918.

Der volle Inhalt der Quelle
Annotation:
In this paper, we present the partitioning of mutual-exclusion (mutex) constraints in temporal planning problems and its implementation in the SGPlan4 planner. Based on the strong locality of mutex constraints observed in many benchmarks of the Fourth International Planning Competition (IPC4), we propose to partition the constraints of a planning problem into groups based on their subgoals. Constraint partitioning leads to significantly easier subproblems that are similar to the original problem and that can be efficiently solved by the same planner with some modifications to its objective function. We present a partition-and-resolve strategy that looks for locally optimal subplans in constraint-partitioned temporal planning subproblems and that resolves those inconsistent global constraints across the subproblems. We also discuss some implementation details of SGPlan4, which include the resolution of violated global constraints, techniques for handling producible resources, landmark analysis, path finding and optimization, search-space reduction, and modifications of Metric-FF when used as a basic planner in SGPlan4. Last, we show results on the sensitivity of each of these techniques in quality-time trade-offs and experimentally demonstrate that SGPlan4 is effective for solving the IPC3 and IPC4 benchmarks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Jiliang Luo, Weimin Wu, Hongye Su und Jian Chu. „Supervisor Synthesis for Enforcing a Class of Generalized Mutual Exclusion Constraints on Petri Nets“. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 39, Nr. 6 (November 2009): 1237–46. http://dx.doi.org/10.1109/tsmca.2009.2027111.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Mutual exclusion constraints"

1

Bouazza, Syrine. „Contrôle des processus de désassemblage à l'aide des formalismes des systèmes à évènements discrets“. Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPAST215.

Der volle Inhalt der Quelle
Annotation:
Le contrôle des processus de désassemblage fait référence aux méthodes et aux techniques utilisées pour démonter de manière sûre et efficace des composants mécaniques ou des ensembles complexes. Pour ce faire, des approches de commandes des contrôles sont développés pour satisfaire les contraintes imposées à ces systèmes. Plus précisément, dans cette thèse nous nous s'intéressons à trois types de spécifications : les contraintes marquages, les Contraintes de Marquage Généralisées (CMGs), et les Contraintes d'Exclusions Mutuelles (CEMs).Pour cela, nous avons proposé trois méthodes analytiques. La première contribution concerne une nouvelle technique de conception de lois de commande pour les systèmes de désassemblages afin d'assurer la satisfaction des contraintes de marquage dans des Graphes d'Evénements Temporisés (GETs) avec certaines transitions d'entrée incontrôlables. La deuxième technique met l'accent sur la synthèse des contrôleurs tout en assurant des CMGs spécifiées par des inégalités pondérées dans l'algèbre Min-Plus soumis à des GETs. La dernière approche vise à piloter les processus de désassemblages modélisés par des Réseaux de Graphes d'Evénements Temporisés (RGETs) imposés à des CEMs.En alternative, il convient de noter que ces approches se basent sur les structures conceptuelles des Systèmes à Evénements Discrets (SEDs) ainsi que sur l'algèbre Min-Plus. Ces outils offrent la capacité de représenter de façon exacte et méthodique les systèmes de manufacturier. Par conséquent, la problématique se trouve formulée en utilisant des modèles linéaires de contrôle basés sur l'algèbre Min-Plus. En fait, le comportement de ces graphes est décrite en utilisant des équations Min-Plus linéaires, et les contraintes sont exprimées par des inégalités ou des inégalités pondérées dans l'algèbre Min-Plus.Des conditions suffisantes pour l'existence des lois de commande causales sont établies. Ces contrôleurs développés sont des retours d'états qui peuvent être symbolisés par des places de surveillance empêchant le système de toute violation de contrainte. Le graphe est vivant et sans blocage
Disassembly process control involves the methods and techniques used to safely and efficiently disassemble mechanical components or complex assemblies. To do this, control approaches are developed to satisfy the constraints imposed on these systems. More specifically, in this thesis we are interested in three types of specifications: marking constraints, Generalized Marking Constraints (GMCs), and Mutual Exclusion Constraints (MECs).To this aim, we have proposed three analytical methods. The first contribution concerns a new technique for designing control laws for disassembly systems to ensure the satisfaction of marking constraints in Timed Event Graphs (TEGs) with some uncontrollable input transitions. The second technique focuses on controller synthesis while ensuring GMCs specified by weighted inequalities in the Min-Plus algebra subject to GETs. The final method aims to control disassembly processes modelled by Timed Event Graph Networks (NGETs) imposed on MECs.Alternatively, it is worth noting that these approaches are based on the conceptual structures of Discrete Event Systems (DES) and the Min-Plus algebra. These tools offer the ability to represent manufacturing systems accurately and methodically. Consequently, the problem is formulated using linear control models based on Min-Plus algebra. In fact, the behaviour of these graphs is described using linear Min-Plus equations, and constraints are expressed by inequalities or weighted inequalities in the Min-Plus algebra.Sufficient conditions for the existence of causal control laws are established. These developed controllers are state feedbacks that can be represented by monitoring places preventing the system from any constraint violation. The graph is alive and unblocked
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Mutual exclusion constraints"

1

Mameli, Matteo. Why Human Nature Matters. Bloomsbury Publishing Plc, 2024. http://dx.doi.org/10.5040/9781350189782.

Der volle Inhalt der Quelle
Annotation:
Does human nature constrain social and political change? Or do social and political changes transform human nature? Why Human Nature Matters argues that instead of being mutually exclusive, the answer to both questions is yes! This philosophical account of human nature explores the relation between biology and politic, explaining clearly what is at stake in issues from climate change to the social and political consequences of the technological revolution. Appeals to human nature are often used in support of a politics of exclusion. The biological study of human beings has been put to the service of racism, sexism, ableism, and other forms of oppression. By demolishing these existential biases and building on advancements in biological theory, this book explores the philosophical significance of those developments and offers new conceptual tools for linking a biological understanding of humanity to a politics of inclusion and freedom.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Teoh, Karen M. Schooling Diaspora. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190495619.001.0001.

Der volle Inhalt der Quelle
Annotation:
Schooling Diaspora relates the previously untold story of female education and the overseas Chinese in British Malaya and Singapore, traversing more than a century of British imperialism, Chinese migration, and Southeast Asian nationalism. This book explores the pioneering English- and Chinese-language girls’ schools in which these women studied and worked, drawing from school records, missionary annals, colonial reports, periodicals, and oral interviews. The history of educated overseas Chinese girls and women reveals the surprising reach of transnational female affiliations and activities in an age and a community that most accounts have cast as male dominated. These women created and joined networks in schools, workplaces, associations, and politics. They influenced notions of labor and social relations in Asian and European societies. They were at the center of political debates over language and ethnicity and were vital actors in struggles over twentieth-century national belonging. Their education empowered them to defy certain sociocultural conventions in ways that school founders and political authorities did not anticipate. At the same time, they contended with an elite male discourse that perpetuated patriarchal views of gender, culture, and nation. Even as their schooling propelled them into a cosmopolitan, multi-ethnic public space, Chinese girls and women in diaspora often had to take sides as Malayan and Singaporean society became polarized—sometimes falsely—into mutually exclusive groups of British loyalists, pro-China nationalists, and Southeast Asian citizens. They negotiated these constraints to build unique identities, ultimately contributing to the development of a new figure: the educated transnational Chinese woman.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Mutual exclusion constraints"

1

Roy, Bernard, und Roman Slowinski. „Multicriteria Task Allocation to Heterogenous Processors with Capacity and Mutual Exclusion Constraints“. In Applications of Combinatorial Optimization, 327–64. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118600283.ch11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Roy, Bernard, und Roman Slowinski. „Multicriteria Task Allocation to Heterogenous Processors with Capacity and Mutual Exclusion Constraints“. In Applications of Combinatorial Optimization, 327–64. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119005384.ch11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Schefer, Sigrid, Mark Strembeck, Jan Mendling und Anne Baumgrass. „Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context“. In On the Move to Meaningful Internet Systems: OTM 2011, 329–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25109-2_22.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Strembeck, Mark, und Jan Mendling. „Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context“. In On the Move to Meaningful Internet Systems: OTM 2010, 204–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16934-2_16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Bouazza, Syrine, Said Amari, Hichem Hassine, Maher Barkallah und Mohamed Haddar. „A New Approach to Solve the Mutual Exclusion Constraints Problem for Discrete Event Systems with Disturbances – Application to a Manufacturing Workshop“. In Lecture Notes in Mechanical Engineering, 72–82. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57324-8_9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Berry, Aidan, und Robin Jarvis. „Accounting for decision making: resource constraints and decisions which are mutually exclusive“. In Accounting in a Business Context, 341–57. Boston, MA: Springer US, 1994. http://dx.doi.org/10.1007/978-1-4899-6942-2_18.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Berry, Aidan, und Robin Jarvis. „Accounting for decision making: resource constraints and decisions which are mutually exclusive“. In Accounting in a Business Context, 288–304. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4899-6944-6_16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Marwedel, Peter. „System Software“. In Embedded Systems, 203–37. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60910-8_4.

Der volle Inhalt der Quelle
Annotation:
AbstractIn order to cope with the complexity of applications of embedded systems, reuse of components is a key technique. As pointed out by Sangiovanni-Vincentelli (The context for platform-based design. IEEE Design and Test of Computers, 2002), software and hardware components must be reused in the platform-based design methosdology (see p. 296). These components comprise knowledge from earlier design efforts and constitute intellectual property (IP). Standard software components that can be reused include system software components such as embedded operating systems (OSs) and middleware. The last term denotes software that provides an intermediate layer between the OS and application software. This chapter starts with a description of general requirements for embedded operating systems. This includes real-time capabilities as well as adaptation techniques to provide just the required functionality. Mutually exclusive access to resources can result in priority inversion, which is a serious problem for real-time systems. Priority inversion can be circumvented with resource access protocols. We will present three such protocols: the priority inheritance, priority ceiling, and stack resource protocols. A separate section covers the ERIKA real-time system kernel. Furthermore, we will explain how Linux can be adapted to systems with tight resource constraints. Finally, we will provide pointers for additional reusable software components, like hardware abstraction layers (HALs), communication software, and real-time data bases. Our description of embedded operating systems and of middleware in this chapter is consistent with the overall design flow.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Hsiung, Pao-Ann, Yen-Hung Lin und Yean-Ru Chen. „Safecharts Model Checking for the Verfication of Safety-Critical Systems“. In Verification, Validation and Testing in Software Engineering, 427–66. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59140-851-2.ch014.

Der volle Inhalt der Quelle
Annotation:
Unintentional design faults in safety-critical systems might result in injury or even death to human beings. However, the safety verification of such systems is getting very difficult because designs are becoming very complex. To cope with high design complexity, model-driven architecture (MDA) design is becoming a well-accepted trend. However, conventional methods of code testing and hazard analysis do not fit very well with MDA. To bridge this gap, we propose a safecharts model-based formal verification technique for safety-critical systems. The safety constraints in safecharts are mapped to semantic equivalents in timed automata. The theory for safety verification is proved and implemented in the SGM model checker. Prioritized and urgent transitions are implemented in SGM to model the safe chart risk semantics. Finally, it is shown that priority-based approach to mutual exclusion of resource usage in safecharts is unsafe and solutions are proposed. Application examples show the benefits of the proposed model-driven verification method.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Merilä, Juha, und Mats Björklund. „Phenotypic Integration as a Constraint and Adaptation“. In Phenotypic Integration, 107–29. Oxford University PressNew York, NY, 2004. http://dx.doi.org/10.1093/oso/9780195160437.003.0005.

Der volle Inhalt der Quelle
Annotation:
Abstract Despite the enormous diversity of living forms, it is quite clear that not all imaginable life forms-such as angels-have ever come into existence. There are two broad explanations for this. First, according to what can be called the genetic/epigenetic constraint view (e.g., Maynard Smith et al. 1985), organisms are to some degree victims of their own history: solutions available for a given organism or clade are constrained by its evolutionary history, as for instance dictated by its genetic architecture and/or ancestral developmental pathways. Second, according to what can be termed the functionalist/adaptationist view (Gould and Lewontin 1979), almost any solution to a problem posed by a selective environment is possible, insofar as it is not opposed by the laws of physics or by natural selection. Hence, organisms like angels might not exist either because of constraints of development, or because they are not fit for selective reasons. These two world views, although frequently polarized, are of course not mutually exclusive (Maynard Smith et al. 1985; Schlichting and Pigliucci 1998).
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Mutual exclusion constraints"

1

Achour, Z., und N. Rezg. „Time Floating General Mutual Exclusion Constraints (TFGMEC)“. In Multiconference on "Computational Engineering in Systems Applications. IEEE, 2006. http://dx.doi.org/10.1109/cesa.2006.4281778.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Easwaran, Arvind, und Björn Andersson. „Scheduling Sporadic Tasks on Multiprocessors with Mutual Exclusion Constraints“. In 2009 International Conference on Parallel Processing Workshops (ICPPW). IEEE, 2009. http://dx.doi.org/10.1109/icppw.2009.59.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Ma, Ziyue, Zhiwu Li und Alessandro Giua. „Petri net controllers for disjunctive Generalized Mutual Exclusion Constraints“. In 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation (ETFA). IEEE, 2013. http://dx.doi.org/10.1109/etfa.2013.6648003.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Hou, Junyao, Hesuan Hu, Yuan Zhou und Yang Liu. „Decentralized supervisory control of Generalized Mutual Exclusion Constraints in Petri Nets“. In 2017 13th IEEE Conference on Automation Science and Engineering (CASE 2017). IEEE, 2017. http://dx.doi.org/10.1109/coase.2017.8256129.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Achour, Zied, und Nidhal Rezg. „Time Floating General Mutual Exclusion Constraints in Partial Observable Discrete Event Systems“. In 2006 IEEE International Conference on Information Reuse & Integration. IEEE, 2006. http://dx.doi.org/10.1109/iri.2006.252391.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Wang, ShouGuang, ChengYing Wang und MengChu Zhou. „A transformation algorithm for optimal admissible generalized mutual exclusion constraints on Petri nets with uncontrollable transitions“. In 2011 IEEE International Conference on Robotics and Automation (ICRA). IEEE, 2011. http://dx.doi.org/10.1109/icra.2011.5979727.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Liu, Meng, Xuyun Zhang, Chi Yang, Shaoning Pang, Deepak Puthal und Kaijun Ren. „Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control“. In 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, 2017. http://dx.doi.org/10.1109/trustcom/bigdatase/icess.2017.277.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Mitu, Cristinadana. „THE STRUCTURE OF AN E-LEARNING SITE IN TERMS OF CAPITALIZATION OF CULTURAL DIVERSITY FOR THE BENEFIT OF STUDENTS AND THE QUALITY OF EDUCATIONAL ACT“. In eLSE 2015. Carol I National Defence University Publishing House, 2015. http://dx.doi.org/10.12753/2066-026x-15-200.

Der volle Inhalt der Quelle
Annotation:
As a powerful engine of the knowledge-based society, e-Learning system has the ability to transform education, generating major initiatives needed in identifying new skills and behaviors. The release from the constraints of space and time and the ability to connect to Web resources made of the new online media ideal tools for distance learning. The sites of e-Learning join together numerous services which offer a rich experience of solutions and technologies for an educational system. They should form an immersive environment in which users can adjust gradually feeling its familiarity. This new type of education enables the formation of communities of students and teachers from all over the world so that they can harness the potential of using information technologies. It is also a planned teaching-learning experience organized by an institution that provides teaching materials in the online mode, in a sequential and logical order to be assimilated by students in their own way and at the desired place. The paper aims to present the structure of such a site, proposing a communication mechanism at the level of the site so that each student should be able to get a perspective on the information supplied in accordance with their own education, culture and areas of interest. An e-Learning site represents a meeting space of very broad categories of human types and provides support for holding an exclusive educational system via the Internet, with a structure and a very complex functionality. This should include public, generally accessible, informative sections, but also private sections for students and teachers. The paper also aims at defining the concept of quality of the educational act in e-Learning systems aiming to surprise a diversified approach to students in order to establish a genuine communication, providing differentiated access to the most diverse groups of trainees. The knowledge of authentic mutual awareness and the existence of common concepts and concerns is absolutely necessary in order to establish this genuine communication. An e-Learning site should be a necessary dosage of visual, content and accessibility providing a suitable communication environment of a very heterogeneous category of users.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie