{"title":"Data Mining and Big Data Computing Platform for the Professional Identity","authors":"Jingjing Gao","doi":"10.1007/978-3-030-79200-8_144","DOIUrl":"https://doi.org/10.1007/978-3-030-79200-8_144","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130680475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application Analysis of User Portrait in Library Field","authors":"Jie Dong, Xichen Xing","doi":"10.1007/978-3-030-79200-8_61","DOIUrl":"https://doi.org/10.1007/978-3-030-79200-8_61","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127880582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Strategy of Front-End Development Technology of Computer Website","authors":"R. Wu","doi":"10.1007/978-3-030-79200-8_39","DOIUrl":"https://doi.org/10.1007/978-3-030-79200-8_39","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126849293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development and Application of Artificial Intelligence Technology to Unmanned Driving Under the Background of Wireless Communication","authors":"Zhenxing Bian","doi":"10.1007/978-3-030-79200-8_77","DOIUrl":"https://doi.org/10.1007/978-3-030-79200-8_77","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117191261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BP Neural Network Based on Genetic Algorithm in Economic and Industrial Structure Analysis and Prediction","authors":"Yajun Yang","doi":"10.1007/978-3-030-79200-8_33","DOIUrl":"https://doi.org/10.1007/978-3-030-79200-8_33","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130306573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Expression of Internet Altruistic Behavior in Big Data Era","authors":"Jing Lin","doi":"10.1007/978-3-030-79200-8_118","DOIUrl":"https://doi.org/10.1007/978-3-030-79200-8_118","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124716942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial Intelligence-Based Tennis Match Technique and Tactics Evaluation System","authors":"Shanshan Yin","doi":"10.1007/978-3-030-79200-8_82","DOIUrl":"https://doi.org/10.1007/978-3-030-79200-8_82","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115376964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modern Digital Technology Assisted Innovative Design of Chinese Knot Button Modeling Art","authors":"Yu Zhang","doi":"10.1007/978-3-030-79200-8_116","DOIUrl":"https://doi.org/10.1007/978-3-030-79200-8_116","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115784909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Precision Marketing Strategy of Insurance Market from the Perspective of Big Data","authors":"Ze Zhang, Qing Fan","doi":"10.1007/978-3-030-79200-8_127","DOIUrl":"https://doi.org/10.1007/978-3-030-79200-8_127","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128761412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Drug Traceability System Based on RFID and Alliance Block Chain Technology","authors":"Hongjin Li, Xiaohua Wang","doi":"10.1007/978-3-030-79200-8_97","DOIUrl":"https://doi.org/10.1007/978-3-030-79200-8_97","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"397 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133783490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}