{"title":"Prediction on Petroleum Demand Under the Epidemic Crisis - Based on Computer-Implemented Grey BP Neural Network Algorithm","authors":"Mu Ling","doi":"10.1007/978-3-030-53980-1_41","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_41","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"976 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiale Zhang, Jiahui Liu, Xianchuan Wang, Kai Song, Xianchao Wang
{"title":"Ternary Optical Computer Task Dispatch Model Based on Priority Queuing System","authors":"Jiale Zhang, Jiahui Liu, Xianchuan Wang, Kai Song, Xianchao Wang","doi":"10.1007/978-3-030-53980-1_99","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_99","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129934671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Literacy Cultivation and Course Informationization Construction of University Management Course","authors":"Pei-lang Chen","doi":"10.1007/978-3-030-53980-1_3","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_3","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123994946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Intrusion Path of Power Monitoring System Based on Simulation System","authors":"Li Feng, Ke Zhao","doi":"10.1007/978-3-030-53980-1_37","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_37","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115174506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traceability of Agricultural Product Quality and Safety Based on Blockchain - Taking Fresh E-commerce as an Example","authors":"Chao Xie, Xiaoyong Xiao","doi":"10.1007/978-3-030-53980-1_43","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_43","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126656762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low Energy Consumption and Data Optimization of Distributed Sensing Wireless Network in Underground Space","authors":"Z. Meng","doi":"10.1007/978-3-030-53980-1_36","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_36","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125468552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time Monitoring System for DGA Domain Based on Long Short-Term Memory","authors":"Bocheng Liu, Haoyu Wang","doi":"10.1007/978-3-030-53980-1_24","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_24","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130757134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zheheng Liang, Xiaojiang Chen, Jinbo Zhang, Guiquan Shen, Hao Li
{"title":"Standardized Storage of Personalized Environment Terminal Based on Cloud Storage Technology","authors":"Zheheng Liang, Xiaojiang Chen, Jinbo Zhang, Guiquan Shen, Hao Li","doi":"10.1007/978-3-030-53980-1_28","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_28","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"455 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116181777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Database Intrusion Detection Technology Based on VGG-SVM","authors":"Mingyuan Xin, Yong Wang","doi":"10.1007/978-3-030-53980-1_14","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_14","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116223573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}