{"title":"Empirical Research on Bidirectional Channel of Sports Culture Artificial Intelligence in the Era of Big Data","authors":"Kewei Yu, Chang Chen","doi":"10.1007/978-3-030-53980-1_67","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_67","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127155134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Path of Higher Education Management in the Era of Big Data","authors":"Wenjun Yu, Cunxing Su","doi":"10.1007/978-3-030-53980-1_66","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_66","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127910209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shuoshuo Guo, Xiaofeng Wang, Yang Liu, Xiaogang Zhu, Ying Zhai
{"title":"A Comparison Study of Three Types of Parameter Estimation Methods on Weibull Model","authors":"Shuoshuo Guo, Xiaofeng Wang, Yang Liu, Xiaogang Zhu, Ying Zhai","doi":"10.1007/978-3-030-53980-1_103","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_103","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126898634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Path of Improving the Effectiveness of Ideological and Political Education from the Perspective of Educational Informatization","authors":"Jieqiong Zhou","doi":"10.1007/978-3-030-53980-1_127","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_127","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123178048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Motivation of Online Additional Review Based on Grounded Theory","authors":"Jin Ruan, Yanxia Cheng","doi":"10.1007/978-3-030-53980-1_10","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_10","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121841180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constituent Elements of Internet Customers' Driving Ability from the Perspective of Process Orientation","authors":"Yumeng Sun, Yanxia Cheng","doi":"10.1007/978-3-030-53980-1_11","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_11","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Can Network Communication and Big Data Improve the Efficiency of Government's Provision of Public Goods","authors":"Tongfeng Dai","doi":"10.1007/978-3-030-53980-1_2","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_2","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"257 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123097342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Du, Fengying Wang, Juan Wang, Jie Dong, F. Jiang, Changyao Lv
{"title":"Synchronization of Dynamical Networks with Non-identical Nodes by Switching Network Control","authors":"L. Du, Fengying Wang, Juan Wang, Jie Dong, F. Jiang, Changyao Lv","doi":"10.1007/978-3-030-53980-1_35","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_35","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125005170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Composition and Function Analysis of Electroless Nickel Plating Solution Based on Intelligent Network","authors":"Yao Cheng","doi":"10.1007/978-3-030-53980-1_33","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_33","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121816261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huang Ping, W. Liu, L. Xinlin, Deng Wei, Shijing Tong, Yuan Liu, Anji Zuo
{"title":"Authentication and Encryption System for User Information Security in Power Grid System","authors":"Huang Ping, W. Liu, L. Xinlin, Deng Wei, Shijing Tong, Yuan Liu, Anji Zuo","doi":"10.1007/978-3-030-53980-1_86","DOIUrl":"https://doi.org/10.1007/978-3-030-53980-1_86","url":null,"abstract":"","PeriodicalId":122705,"journal":{"name":"International Conference on Applications and Techniques in Cyber Intelligence","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125720127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}