Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00048
Liang Chen, Jie Li, Bocheng Zhang
At present, there are some security risks existing in power web system, such as large number of systems, low efficiency of vulnerability identification, poor intelligence level of vulnerability penetration and so on. To solve the problems, this paper studies parallel crawler and multithreaded crawler scanning technology to effectively improve the code and data crawling speed of power web system, so as to improve the efficiency of vulnerability scanning identification. Furthermore, the paper studies the decision-making selection technology of vulnerability feature pattern recognition and vulnerability intelligent detection model of power web system based on LSTM, breaks through the key technologies of semi-automatic outlier sample detection and intelligent vulnerability location and identification, effectively improves the efficiency of vulnerability location and identification, and reduces the labor cost in the process of data processing. Then, based on neural network algorithm, combined with expert experience and exploitation characteristics, the combination rules of parallel and chain are trained. Finally, the deep neural network algorithm is used to judge the feasibility of vulnerability exploitation path, eliminate those paths that cannot be successfully attacked, and improve the success of vulnerability exploitation, so as to improve the ability of intelligent discovery of vulnerability risks.
{"title":"Intelligent Penetration Technology of Power Web System Vulnerability Based on Deep Learning","authors":"Liang Chen, Jie Li, Bocheng Zhang","doi":"10.1109/CBFD52659.2021.00048","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00048","url":null,"abstract":"At present, there are some security risks existing in power web system, such as large number of systems, low efficiency of vulnerability identification, poor intelligence level of vulnerability penetration and so on. To solve the problems, this paper studies parallel crawler and multithreaded crawler scanning technology to effectively improve the code and data crawling speed of power web system, so as to improve the efficiency of vulnerability scanning identification. Furthermore, the paper studies the decision-making selection technology of vulnerability feature pattern recognition and vulnerability intelligent detection model of power web system based on LSTM, breaks through the key technologies of semi-automatic outlier sample detection and intelligent vulnerability location and identification, effectively improves the efficiency of vulnerability location and identification, and reduces the labor cost in the process of data processing. Then, based on neural network algorithm, combined with expert experience and exploitation characteristics, the combination rules of parallel and chain are trained. Finally, the deep neural network algorithm is used to judge the feasibility of vulnerability exploitation path, eliminate those paths that cannot be successfully attacked, and improve the success of vulnerability exploitation, so as to improve the ability of intelligent discovery of vulnerability risks.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131786428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00078
Jingzhu Mu, Jinjie Lao
The lookback option is one of the exotic options but the only option that allows investors to reduce risks by looking back at the option period. Compared with other options, it allows the holder to know history when determining when to exercise their option, which reduces uncertainties and solves the market timing problem. However, not many people currently realize the benefits of the option and why they should invest. In the paper, we analyze the lookback option based on its unique characteristics and options theory. We established this paper with the Black-Scholes Merton method by taking Facebook as an underlying asset to simulate the stock price and the payoffs from the fixed lookback call option and floating lookback call option. At the end of the analysis, we concluded that the change of strike price leads to an obvious change to the fixed lookback option and European Option price, compared to the floating lookback option. The change of both spot price and volatility contributes a clear difference to the lookback option relative to the European Option. Besides, the lookback option solves the market timing problems even though with a higher option price. This paper aims to explain to investors that the lookback option is one of the best options for investment.
{"title":"Investigating the Price of Floating Lookback Option and Fixed Lookback Option Based on Facebook Stock","authors":"Jingzhu Mu, Jinjie Lao","doi":"10.1109/CBFD52659.2021.00078","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00078","url":null,"abstract":"The lookback option is one of the exotic options but the only option that allows investors to reduce risks by looking back at the option period. Compared with other options, it allows the holder to know history when determining when to exercise their option, which reduces uncertainties and solves the market timing problem. However, not many people currently realize the benefits of the option and why they should invest. In the paper, we analyze the lookback option based on its unique characteristics and options theory. We established this paper with the Black-Scholes Merton method by taking Facebook as an underlying asset to simulate the stock price and the payoffs from the fixed lookback call option and floating lookback call option. At the end of the analysis, we concluded that the change of strike price leads to an obvious change to the fixed lookback option and European Option price, compared to the floating lookback option. The change of both spot price and volatility contributes a clear difference to the lookback option relative to the European Option. Besides, the lookback option solves the market timing problems even though with a higher option price. This paper aims to explain to investors that the lookback option is one of the best options for investment.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134043620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00016
Wen-Fang Wu, Yongjia Li, Chang Che
At present, with deep learning technology applied in the field of machine vision, image colorization has gradually become a hot research direction. The traditional image colorization technology needs human-computer interaction in the application. The operation process of this technology is complex and difficult, it is difficult to achieve large-scale application. Considering the shortcomings of the traditional methods, We propose an image colorization algorithm by designing the improved generation adversarial network (GAN). Aiming at the problem of black-and-white photos' colorization, the self-attention model (SAM) is used to construct the task of image generation. Image details are generated according to the clues of all feature positions, and the spectral normalization method is introduced to improve the quality of the network generated image. The discriminator of the algorithm that we proposed can effectively check the consistency of the features of long-range details in the image. Experimental results show that the algorithm can effectively achieve the batch colorization of black-and-white images.
{"title":"Image Colorization Algorithm Based on Improved GAN","authors":"Wen-Fang Wu, Yongjia Li, Chang Che","doi":"10.1109/CBFD52659.2021.00016","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00016","url":null,"abstract":"At present, with deep learning technology applied in the field of machine vision, image colorization has gradually become a hot research direction. The traditional image colorization technology needs human-computer interaction in the application. The operation process of this technology is complex and difficult, it is difficult to achieve large-scale application. Considering the shortcomings of the traditional methods, We propose an image colorization algorithm by designing the improved generation adversarial network (GAN). Aiming at the problem of black-and-white photos' colorization, the self-attention model (SAM) is used to construct the task of image generation. Image details are generated according to the clues of all feature positions, and the spectral normalization method is introduced to improve the quality of the network generated image. The discriminator of the algorithm that we proposed can effectively check the consistency of the features of long-range details in the image. Experimental results show that the algorithm can effectively achieve the batch colorization of black-and-white images.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125249979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00032
Qian Wang
Under the framework of behavioral finance, the modeling idea of the SIS epidemic model is used to study investors’ behavioral contagion affecting the capital flow of the stock market. An index model of the stock market is established and stability of equilibrium is analyzed. The threshold theorem applicable to the stock market is obtained. This paper quantifies the behavioral contagion of investors by defining the investment infection rate and the investment removal rate. The model built on this basis can more accurately describe the behavior of investors in actual investment decision-making and its impact on stock indexes. Both the theoretical research and empirical analysis indicate the rises and falls of the stock are consistent with changes in the proportion of the infection rate and the removal rate, revealing a clear positive correlation and the dominant nonlinear relationship. Finally, the Granger causality test is carried out, and the results show that investor behavioral contagion is the cause of the stock market’s rise and fall changes. Investor behavior contagion affects the stock price, but the stock price changes are not the cause of contagious changes in investor behavior.
{"title":"An Index Model of Stock Market Based on Investors’ Behavioral Contagion","authors":"Qian Wang","doi":"10.1109/CBFD52659.2021.00032","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00032","url":null,"abstract":"Under the framework of behavioral finance, the modeling idea of the SIS epidemic model is used to study investors’ behavioral contagion affecting the capital flow of the stock market. An index model of the stock market is established and stability of equilibrium is analyzed. The threshold theorem applicable to the stock market is obtained. This paper quantifies the behavioral contagion of investors by defining the investment infection rate and the investment removal rate. The model built on this basis can more accurately describe the behavior of investors in actual investment decision-making and its impact on stock indexes. Both the theoretical research and empirical analysis indicate the rises and falls of the stock are consistent with changes in the proportion of the infection rate and the removal rate, revealing a clear positive correlation and the dominant nonlinear relationship. Finally, the Granger causality test is carried out, and the results show that investor behavioral contagion is the cause of the stock market’s rise and fall changes. Investor behavior contagion affects the stock price, but the stock price changes are not the cause of contagious changes in investor behavior.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114793547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00088
Qiuting Zhao, Yuxi He, Huchuan Zhang
Based on the panel data of SMEs listed on the SME Board from 2014 to 2018, this paper constructs a benchmark regression model and a mediating effect model and conducts an empirical study on the relationship between the development degree of digital financial inclusion in China and the innovation of SMEs listed on the SME Board. The results show that the development degree of digital financial inclusion has a significant positive impact on enterprise innovation, and the promotion effect is more significant for small-scale enterprises. Digital financial inclusion also indirectly affects the level of innovation of enterprises through financing constraints. The results of replacing the digital financial inclusion index with the digital financial inclusion index are still significant. This paper puts forward implementing policies and letting them play a role in the investment and financing field for small and medium-sized enterprises. We should lift financing constraints, improve the efficiency of financing, and vigorously develop inclusive finance suggestions.
{"title":"Does Digital Financial Inclusion Promote SME Innovation? : -- Evidence from SMEs listed companies","authors":"Qiuting Zhao, Yuxi He, Huchuan Zhang","doi":"10.1109/CBFD52659.2021.00088","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00088","url":null,"abstract":"Based on the panel data of SMEs listed on the SME Board from 2014 to 2018, this paper constructs a benchmark regression model and a mediating effect model and conducts an empirical study on the relationship between the development degree of digital financial inclusion in China and the innovation of SMEs listed on the SME Board. The results show that the development degree of digital financial inclusion has a significant positive impact on enterprise innovation, and the promotion effect is more significant for small-scale enterprises. Digital financial inclusion also indirectly affects the level of innovation of enterprises through financing constraints. The results of replacing the digital financial inclusion index with the digital financial inclusion index are still significant. This paper puts forward implementing policies and letting them play a role in the investment and financing field for small and medium-sized enterprises. We should lift financing constraints, improve the efficiency of financing, and vigorously develop inclusive finance suggestions.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124691757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00072
Kun Qian, Yingxue Li
information economy has formed its basic knowledge system and a good situation of integration with other disciplines after nearly 100 years of germination and development. The analysis and research of information economy is becoming more and more abundant. According to certain retrieval conditions, 863 literatures published from 1995 to 2021 are retrieved from CNKI database as data samples. CiteSpace software is used for visual analysis, CO citation analysis and cluster analysis are carried out on these literature data, and the corresponding knowledge map is drawn. This paper makes a comprehensive analysis of the research progress, content system and main application fields of information economics in China, and concludes that it has formed a basic knowledge system and a good situation of integration with other disciplines.
{"title":"Visualization analysis of information economy based on CiteSpace","authors":"Kun Qian, Yingxue Li","doi":"10.1109/CBFD52659.2021.00072","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00072","url":null,"abstract":"information economy has formed its basic knowledge system and a good situation of integration with other disciplines after nearly 100 years of germination and development. The analysis and research of information economy is becoming more and more abundant. According to certain retrieval conditions, 863 literatures published from 1995 to 2021 are retrieved from CNKI database as data samples. CiteSpace software is used for visual analysis, CO citation analysis and cluster analysis are carried out on these literature data, and the corresponding knowledge map is drawn. This paper makes a comprehensive analysis of the research progress, content system and main application fields of information economics in China, and concludes that it has formed a basic knowledge system and a good situation of integration with other disciplines.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122812943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00090
Gongguo Zhang, Zhou Wan
IoT devices have the characteristics of limited performance and mobility, which makes it difficult for traditional centralized security authentication methods to support security authentication in the current IoT environment. In order to cope with these challenges, this paper proposes a security authentication system named iot-chain in the Internet of Things, which provides attribute-based security authentication based on the Hyperledger Fabric blockchain framework. The system contains three kinds of chain codes, namely access code, device code, and policy code. The access code is the main program that implements the user safety authentication method. The device code provides a query method for the URL of the resource data generated by the storage device, and the policy code provides the access control strategy for the administrator user. Combining access control and blockchain technology, iot-chain provides dynamic security authentication management in the Internet of Things. Experimental results show that iot-chain can maintain high throughput and effectively reach consensus in a distributed system.
{"title":"Blockchain-based IoT security authentication system","authors":"Gongguo Zhang, Zhou Wan","doi":"10.1109/CBFD52659.2021.00090","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00090","url":null,"abstract":"IoT devices have the characteristics of limited performance and mobility, which makes it difficult for traditional centralized security authentication methods to support security authentication in the current IoT environment. In order to cope with these challenges, this paper proposes a security authentication system named iot-chain in the Internet of Things, which provides attribute-based security authentication based on the Hyperledger Fabric blockchain framework. The system contains three kinds of chain codes, namely access code, device code, and policy code. The access code is the main program that implements the user safety authentication method. The device code provides a query method for the URL of the resource data generated by the storage device, and the policy code provides the access control strategy for the administrator user. Combining access control and blockchain technology, iot-chain provides dynamic security authentication management in the Internet of Things. Experimental results show that iot-chain can maintain high throughput and effectively reach consensus in a distributed system.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124968492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00070
Liu Yu, Xiaoyan Wu, Zuosheng Zhou
When stocks are traded in the market, the price of stock has a great variation. Therefore, predicting the stock price is a huge challenge. Monte Carlo Simulation (MCS) is a typical method for stock price simulation. However, the serviceability of MCS is still insufficient. In this paper, the serviceability analysis has been done to evaluate the performance of MCS in different stocks price simulation. The results show that the Group 1, Group 5 and Group 8 have the highest predicted return under our condition settings. Among them, PDD has the biggest contribution, and the combinations holding PDD have a good return rate. Besides, the combinations holding WMT have a good performance of resisting risk because the WMT has better stability. The findings illustrate that the performance of Monte Carlo is influenced by stock itself more than the investment combination.
{"title":"Serviceability Analysis of Monte Carlo Simulation for Stock Market Trading Price","authors":"Liu Yu, Xiaoyan Wu, Zuosheng Zhou","doi":"10.1109/CBFD52659.2021.00070","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00070","url":null,"abstract":"When stocks are traded in the market, the price of stock has a great variation. Therefore, predicting the stock price is a huge challenge. Monte Carlo Simulation (MCS) is a typical method for stock price simulation. However, the serviceability of MCS is still insufficient. In this paper, the serviceability analysis has been done to evaluate the performance of MCS in different stocks price simulation. The results show that the Group 1, Group 5 and Group 8 have the highest predicted return under our condition settings. Among them, PDD has the biggest contribution, and the combinations holding PDD have a good return rate. Besides, the combinations holding WMT have a good performance of resisting risk because the WMT has better stability. The findings illustrate that the performance of Monte Carlo is influenced by stock itself more than the investment combination.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130269949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00060
Jiaogang Lin, Lu Liang
Under the new background of the rapid development of Internet technology in the information age, Internet technology and graphics and image processing technology have made unprecedented progress. In the process of development, it pointed out the development direction of electrical mode processing in the new era. Computer graphics in computer processing technology needs to be used more optimally, and its own research content involves a wide range of aspects. Its research content includes graphics and image visualization, standardization research, graphics modeling, and image interaction research. At present, China has entered the era of Internet technology development, and various needs and problems have arisen in the development process. At this stage, we should give full play to the application value of information technology in the Internet technology era in graphics and image processing. This article analyzes the structure and technical guarantee realization of technical improvement. The author first briefly explained the current necessity of paying attention to electrical mode processing, and then analyzed the construction content of the technical improvement of image information recognition. The author looks forward to the development prospects of technical improvement under the data detection system in the new era, and hopes to be helpful to the in-depth promotion of technical improvement in the next stage.
{"title":"Research on Key Technologies of Computer Graphics and Image Processing","authors":"Jiaogang Lin, Lu Liang","doi":"10.1109/CBFD52659.2021.00060","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00060","url":null,"abstract":"Under the new background of the rapid development of Internet technology in the information age, Internet technology and graphics and image processing technology have made unprecedented progress. In the process of development, it pointed out the development direction of electrical mode processing in the new era. Computer graphics in computer processing technology needs to be used more optimally, and its own research content involves a wide range of aspects. Its research content includes graphics and image visualization, standardization research, graphics modeling, and image interaction research. At present, China has entered the era of Internet technology development, and various needs and problems have arisen in the development process. At this stage, we should give full play to the application value of information technology in the Internet technology era in graphics and image processing. This article analyzes the structure and technical guarantee realization of technical improvement. The author first briefly explained the current necessity of paying attention to electrical mode processing, and then analyzed the construction content of the technical improvement of image information recognition. The author looks forward to the development prospects of technical improvement under the data detection system in the new era, and hopes to be helpful to the in-depth promotion of technical improvement in the next stage.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130621167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00035
Zhao Hongkai, Zhang Hao
The higher education system is an important part of the country’s education of citizens. In order to adapt to this trend, this paper establishes an evaluation model for the higher education system. The evaluation elements include the health and sustainability of the higher education system. We use this model to evaluate and predict the higher education system. Then, we propose practical policies and implementation schedule. Finally, we evaluate the effectiveness of the policy and possible difficulties.
{"title":"Application of BP Neural Network in Higher Education System","authors":"Zhao Hongkai, Zhang Hao","doi":"10.1109/CBFD52659.2021.00035","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00035","url":null,"abstract":"The higher education system is an important part of the country’s education of citizens. In order to adapt to this trend, this paper establishes an evaluation model for the higher education system. The evaluation elements include the health and sustainability of the higher education system. We use this model to evaluate and predict the higher education system. Then, we propose practical policies and implementation schedule. Finally, we evaluate the effectiveness of the policy and possible difficulties.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122421116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}