{"title":"3D Animation Scene Plane Design Based on Virtual Reality Technology","authors":"Zhiyuan Ying, Jun Ye, Ziteng Wang","doi":"10.1007/978-3-030-53980-1_170","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_170","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130015252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Online Dictionary Based on the Simplified Algorithm","authors":"Fan Wang, Lei Tian, Xufan Huang","doi":"10.1007/978-3-030-53980-1_13","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_13","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128308674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application Research of Artificial Intelligence Technology in Landscape Architectural Art Design","authors":"S. Wang","doi":"10.1007/978-3-030-53980-1_51","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_51","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115864375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Network Security Hazards and Preventive Strategies","authors":"Lei Huang","doi":"10.1007/978-3-030-53980-1_27","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_27","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132035047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Block Chain Algorithm Rationality on Financial Game Rules Impact Study","authors":"Lidong Qiang, Yin Zhang","doi":"10.1007/978-3-030-53980-1_161","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_161","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131303770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Application of Computer Internet of Things in Modern Agricultural Planting Management","authors":"Liang Ge, Jun Chen","doi":"10.1007/978-3-030-53980-1_79","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_79","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127309206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Application Analysis of Computer Network Security Data Encryption Technology","authors":"Liu Jiang","doi":"10.1007/978-3-030-53980-1_21","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_21","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133819345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huang Ping, Wei Liu, L. Xinlin, Deng Wei, Shijing Tong, Yuan Liu, Anji Zuo
{"title":"Technology Architecture of Smart Grid Information Security Defense System","authors":"Huang Ping, Wei Liu, L. Xinlin, Deng Wei, Shijing Tong, Yuan Liu, Anji Zuo","doi":"10.1007/978-3-030-53980-1_97","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_97","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"63 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116441610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relationship Analysis Model of College Students' Mental Health Education and Innovation Ability Based on Association Rule Analysis","authors":"Wenjuan Hao, Xiaolong He","doi":"10.1007/978-3-030-53980-1_136","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_136","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127548109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}