{"title":"The Evolution of Hot Spots of Chinese Tourists' Outbound Tourism","authors":"Chunyan Wang, Hyung-Ho Kim","doi":"10.1007/978-3-030-43309-3_75","DOIUrl":"https://doi.org/10.1007/978-3-030-43309-3_75","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128136348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Education of Ideological and Political Course Under the Background of Cloud Computing","authors":"Xing Hu, Zhongyi Tang","doi":"10.1007/978-3-030-43306-2_85","DOIUrl":"https://doi.org/10.1007/978-3-030-43306-2_85","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125745784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of Agricultural Intellectual Property and Agricultural Science and Technology","authors":"Xue Zhang","doi":"10.1007/978-3-030-43309-3_11","DOIUrl":"https://doi.org/10.1007/978-3-030-43309-3_11","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127563755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation Analysis of Carbon Tax's Impact on China's Economy Based on Dynamic CEG Model","authors":"C. Nian","doi":"10.1007/978-3-030-43309-3_103","DOIUrl":"https://doi.org/10.1007/978-3-030-43309-3_103","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132793457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distribution Information Sharing of Agricultural Products Supply-Chain in Big Data Environment","authors":"Xue Bai, N. Zhai","doi":"10.1007/978-3-030-43306-2_69","DOIUrl":"https://doi.org/10.1007/978-3-030-43306-2_69","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132668934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Comprehensive Evaluation of Sales Decline of Automobile Industry Under the Background of Artificial Intelligence","authors":"Chunjin Zhu, Li Li, Zhenjun Shen","doi":"10.1007/978-3-030-43306-2_95","DOIUrl":"https://doi.org/10.1007/978-3-030-43306-2_95","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123911936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation Algorithm of Difficulty Movements in Competitive Aerobics","authors":"Yanping Peng","doi":"10.1007/978-3-030-43309-3_87","DOIUrl":"https://doi.org/10.1007/978-3-030-43309-3_87","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124438938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jingjing Jiang, Jiashun Wang, Dandan Wang, Xue Song
{"title":"Algorithm Design of Dynamic Question Answering System Based on Knowledge Base","authors":"Jingjing Jiang, Jiashun Wang, Dandan Wang, Xue Song","doi":"10.1007/978-3-030-43306-2_43","DOIUrl":"https://doi.org/10.1007/978-3-030-43306-2_43","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117104468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Early Warning Algorithm for Students' Mentality Transformation in Psychological Database","authors":"Hongxia Huang","doi":"10.1007/978-3-030-43309-3_104","DOIUrl":"https://doi.org/10.1007/978-3-030-43309-3_104","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123530388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis Method of College Student Physical Education Quality Based on Big Data Analysis","authors":"Chuncheng Wang","doi":"10.1007/978-3-030-43306-2_81","DOIUrl":"https://doi.org/10.1007/978-3-030-43306-2_81","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124064675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}