2018
DOI: 10.1007/s11036-018-1136-6
|View full text |Cite
|
Sign up to set email alerts
|

Introduction of Key Problems in Long-Distance Learning and Training

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 266 publications
(17 citation statements)
references
References 6 publications
0
16
0
1
Order By: Relevance
“…Two circuit control registers are used in the circuit design. One is used to record the status signal on the acquisition board for query, and one is used to write the control word to control the working state of the entire acquisition board [7,8].…”
Section: Hardware Design Of Electric Automation Big Data Control Systmentioning
confidence: 99%
“…Two circuit control registers are used in the circuit design. One is used to record the status signal on the acquisition board for query, and one is used to write the control word to control the working state of the entire acquisition board [7,8].…”
Section: Hardware Design Of Electric Automation Big Data Control Systmentioning
confidence: 99%
“…The multi-energy storage combined generation control mode includes multi-energy storage and distributed grid-connected fluctuation and fuzzy control, multi-energy storage island off-grid load control and fuzzy control. The multi-energy storage and distributed grid-connected control mode is to control the switch-on direction of the bidirectional DC-DC converter under the distributed grid-connected power supply mode, according to whether the output power fluctuation of the multi-energy power exceeds the national standard [11,12]. By controlling the start-up and stop time of energy storage or discharge, the energy storage can reduce the power wave momentum of multi-energy and reduce the impact of the power network.…”
Section: Control Generation Control Modementioning
confidence: 99%
“…Meanwhile, (9,5,15,4)•(9,5,15,4) mod 17 = (81,25,225,16) mod 17 = (13,8,4,16). We may verify that 3x 3 + 7x 2 + 3x + 6 can be represented by (13,8,4,16). Similarly, (x 3 + 2x 2 + 3x + 4) + (x 3 + 2x 2 + 3x + 4) mod x 4 + 1 = (2x 3 + 4x 2 + 6x + 8) ∼ = (1,10,13,8) = (9,5,15,4) + (9,5,15,4) mod 17.…”
Section: Plaintext Encodingmentioning
confidence: 99%
“…When compared with non-homomorphic encryptions, it removes the trust on the device and makes us ease to use the computing power of the device. Hence, homomorphic encryption has broad application prospects [5][6][7][8][9][10][11]. In a breakthrough work [12], Gentry demonstrated that fully homomorphic encryption was theoretically possible based on ideal lattices.…”
Section: Introductionmentioning
confidence: 99%