Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43309-3_72
Jingxiao Zhao
{"title":"Application Design of Intelligent Computer Aided Instruction System in Aerobics Teaching","authors":"Jingxiao Zhao","doi":"10.1007/978-3-030-43309-3_72","DOIUrl":"https://doi.org/10.1007/978-3-030-43309-3_72","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"21 13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125775866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43306-2_8
Haiyan Jiang
{"title":"Discussion on Computer Network Security Under the Background of Big Data","authors":"Haiyan Jiang","doi":"10.1007/978-3-030-43306-2_8","DOIUrl":"https://doi.org/10.1007/978-3-030-43306-2_8","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"33 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128732554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43306-2_38
Rongxia Wang
{"title":"Investigation on the Analysis Model of Cloud Classroom Teaching Activities of PHP Network Development Technology Based on xAPI","authors":"Rongxia Wang","doi":"10.1007/978-3-030-43306-2_38","DOIUrl":"https://doi.org/10.1007/978-3-030-43306-2_38","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127513409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43309-3_37
Jianchang Lu, X. Wang
{"title":"Evaluation of Power Consumer Value Based on Matter Element Extension Model","authors":"Jianchang Lu, X. Wang","doi":"10.1007/978-3-030-43309-3_37","DOIUrl":"https://doi.org/10.1007/978-3-030-43309-3_37","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130013928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Motion Control of Four-Axis Aircraft Based on LabVIEW","authors":"Guo Luo, Siwen Zhang, Limin Pan, Cuijing Lu, Hui Li, Xiao-fen Liang, Peiyi Qiu","doi":"10.1007/978-3-030-43309-3_97","DOIUrl":"https://doi.org/10.1007/978-3-030-43309-3_97","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130596328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43306-2_41
Hongliang Men, Hua Liu, Lei Ma
{"title":"Device of a Multi-functional Baby Cradle","authors":"Hongliang Men, Hua Liu, Lei Ma","doi":"10.1007/978-3-030-43306-2_41","DOIUrl":"https://doi.org/10.1007/978-3-030-43306-2_41","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126721467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43309-3_48
Shiqiang Wang
{"title":"Demand Analysis of Potential Customers of Sports Clubs Based on Big Data","authors":"Shiqiang Wang","doi":"10.1007/978-3-030-43309-3_48","DOIUrl":"https://doi.org/10.1007/978-3-030-43309-3_48","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126880865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43309-3_79
C. Ji
{"title":"APP-Based Ideological Education Model for Full-Time Counsellors of Minority Students","authors":"C. Ji","doi":"10.1007/978-3-030-43309-3_79","DOIUrl":"https://doi.org/10.1007/978-3-030-43309-3_79","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126365212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43309-3_35
Z. Chen
{"title":"Bank Card Number Identification Program Based on Template Matching","authors":"Z. Chen","doi":"10.1007/978-3-030-43309-3_35","DOIUrl":"https://doi.org/10.1007/978-3-030-43309-3_35","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121674267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1007/978-3-030-43309-3_8
Quan Liu
{"title":"The Construction and Research of the Enterprise Financial Ecosystem Model Based on Blockchain","authors":"Quan Liu","doi":"10.1007/978-3-030-43309-3_8","DOIUrl":"https://doi.org/10.1007/978-3-030-43309-3_8","url":null,"abstract":"","PeriodicalId":326037,"journal":{"name":"International Conference on Cyber Security Intelligence and Analytics","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124935885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}