2021 29th Telecommunications Forum (TELFOR) 2021
DOI: 10.1109/telfor52709.2021.9653305
|View full text |Cite
|
Sign up to set email alerts
|

Cryptocurrency Price Prediction by Using Hybrid Machine Learning and Beetle Antennae Search Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…Also, in the realm of cryptocurrency prediction, hybridization is a prominent technique. Petrovic et al [39] used a hybridized LSTM-GRU model along with swarm intelligence for cryptocurrency prediction.…”
Section: Related Workmentioning
confidence: 99%
“…Also, in the realm of cryptocurrency prediction, hybridization is a prominent technique. Petrovic et al [39] used a hybridized LSTM-GRU model along with swarm intelligence for cryptocurrency prediction.…”
Section: Related Workmentioning
confidence: 99%
“…Other successful applications of metaheuristics optimizers include tuning of the cloud, edge and fog computing [2,5,15,23,46,59], feature selection challenge [8,19,22,32,37,49,61], dropout regularization [11], a variety of COVID-19 applications [25,58,[62][63][64], tuning artificial neural networks [3,6,7,10,13,18,44], text clustering [21,50] and cryptocurrency price forecast [42].…”
Section: Metaheuristics Optimizationmentioning
confidence: 99%
“…NP-hard complexity with real world problems is common and hence the application of these algorithms is diverse. Some notable examples are artificial neural network optimization [7][8][9][10]12,14,15,19,21,26,32,36,48,53,54], wireless sensors networks (WSNs) [4,11,13,52,65,75], cryptocurrency trends estimations [44,49], finally the COVID-19 global epidemic-associated applications [22,25,64,66,[69][70][71]73], computer-conducted MRI classification and sickness determination [17,20,24,33,55], cloud-edge and fog computing and task scheduling [3,5,6,16,23,50,67], and lastly securing networks through intrusion detection [2,31,43,62,…”
Section: Swarm Intelligence Applications In Machine Learningmentioning
confidence: 99%