Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43309-3_1
Z. Yu, Xun Lin
{"title":"Impact of Environmental Education with VR Equipment on Learning Performance and Environmental Identity","authors":"Z. Yu, Xun Lin","doi":"10.1007/978-3-030-43309-3_1","DOIUrl":"https://doi.org/10.1007/978-3-030-43309-3_1","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114480654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43306-2_52
Tieshuang Zhu
{"title":"Tower Monitoring System Based on BeiDou Navigation Technology","authors":"Tieshuang Zhu","doi":"10.1007/978-3-030-43306-2_52","DOIUrl":"https://doi.org/10.1007/978-3-030-43306-2_52","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128095917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43306-2_80
Jianlan Ren
{"title":"Design and Development of Intelligent Teaching System Supported by Internet of Things, VR and Cloud Computing","authors":"Jianlan Ren","doi":"10.1007/978-3-030-43306-2_80","DOIUrl":"https://doi.org/10.1007/978-3-030-43306-2_80","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133276893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43306-2_84
Yuelin Wu, Haixia Zhu
{"title":"Yigevisual Communication Design for Stage Decoration of Digital Media in the Context of Big Data","authors":"Yuelin Wu, Haixia Zhu","doi":"10.1007/978-3-030-43306-2_84","DOIUrl":"https://doi.org/10.1007/978-3-030-43306-2_84","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133005191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43309-3_92
Wei Zhang
{"title":"Research and Practice of Cloud Desktop Teaching System","authors":"Wei Zhang","doi":"10.1007/978-3-030-43309-3_92","DOIUrl":"https://doi.org/10.1007/978-3-030-43309-3_92","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122376151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43309-3_25
Junwei Xing
{"title":"The Influence of National Economy Informatization on the \"Internet +\" Social and Economic Development","authors":"Junwei Xing","doi":"10.1007/978-3-030-43309-3_25","DOIUrl":"https://doi.org/10.1007/978-3-030-43309-3_25","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125527523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43306-2_17
Zhe Wang
{"title":"Personal Information Security Risks and Legal Prevention from the Perspective of Network Security","authors":"Zhe Wang","doi":"10.1007/978-3-030-43306-2_17","DOIUrl":"https://doi.org/10.1007/978-3-030-43306-2_17","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"2007 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125568865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43306-2_28
Yang Xiao
{"title":"Vision Sharing Method of Network Robot Based on Deep Learning","authors":"Yang Xiao","doi":"10.1007/978-3-030-43306-2_28","DOIUrl":"https://doi.org/10.1007/978-3-030-43306-2_28","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125587655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43309-3_84
Wei Hu, Jing Li, Jie Cheng, Han Guo, Hui Xie
{"title":"Detection Algorithm of DoS High Camouflage Attack Feature Based on S_Kohonen Neural Network","authors":"Wei Hu, Jing Li, Jie Cheng, Han Guo, Hui Xie","doi":"10.1007/978-3-030-43309-3_84","DOIUrl":"https://doi.org/10.1007/978-3-030-43309-3_84","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127988409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43309-3_90
J. Ren, Yuchen Liu
{"title":"Operating Efficiency Optimal Control Algorithms of Flue Gas Denitrification System in Thermal Power Plant","authors":"J. Ren, Yuchen Liu","doi":"10.1007/978-3-030-43309-3_90","DOIUrl":"https://doi.org/10.1007/978-3-030-43309-3_90","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129592110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}