This special issue focuses on all aspects on techniques and applications in cyber intelligence research. The purpose of this special issue is to provide a forum for presentation and discussion of innovative ideas, cutting edge research results, and novel techniques, methods and applications on all aspects of cyber intelligence. It includes selected articles from 2019 International Conference on Applications and Techniques in Cyber Intelligence (ATCI2019) June 22-24, 2019 Huainan, China as well as an open call. The submitted articles were reviewed by experts from both academia and industry. After two rounds of reviewing, the 15 highest quality manuscripts were suggested for EiC to accept for this special issue. This special issue will be published by CCPE as special issues. A combination weighted clustering algorithm is proposed by Li et al1 in the study to reduce the communication overhead of the distributed cognitive network and maintain the stability of the network structure. Li2 investigates edge-forwarding index of routing in the lexicographic product network, which is used to measure the congestion of an edge. Shang et al3 presents the on-chip evolution system of combinational logic circuits by a new hybrid algorithm known as improved genetic-simulated annealing algorithm. Jianmin et al4 proposes the uniform distribution code, model identification code, standard dimension code, and attribute dimensional code. Aiming at the actual production needs of the Dadingzi mountain hydrojunction, An et al5 studies the optimal control of the flood discharge system. Xu et al6 attempts to analyze the traffic network from the perspective of vulnerability. Ding et al7 provides a basis for adjusting the transport organization plan and evacuating passenger flow in emergency. In order to solve the problems of low utilization of the shipyard unreasonable placed of the blocks and unbalanced use of flat transporters, grid search algorithm for block storage yard scheduling is proposed by Zhou et al.8 Pei et al9 establishes a customer experience evaluation index system from the perspectives of O2O takeout platform, delivery staff, and distribution process. To realize the benign interaction between electric vehicle charging and switching power stations and power grid, and the demand-side management of electric vehicle charging and switching power stations, the Monte Carlo random sampling method is used by Gan and Zheng10 to collect the battery-charged state of batteries in one day. Yang and Liu11 draws on the theory of biological immune system, combines the ontology with the growth risk of start-ups, and uses SWRL and Jess engine to build an ontology knowledge base of start-ups' growth risk to identify various risks in the growth process of start-up. Tran et al12 provides a comprehensive research on cellular network traffic prediction using exponential smoothing methods. Guo and Chen13 proposes an interval support vector domain description method through using the dynamic decreasing inertia weight particle swarm optimization. Xu et al14 present the development of a cloud-based difference detection method using big GPR data for roadbed damage detection. Lu et al15 focuses on textual cyberbullying detection because text is the most common form of social media. The guest editors would like to thank Prof. Geoffrey C. Fox who is the editor in chief of CCPE. His help and trust is the most important thing for the success of this SI. The guest editors would like to thank the reviewers for their high-quality reviews, which provided insightful and constructive feedback to the authors of the articles.
Read full abstract