2017 3rd IEEE International Conference on Computer and Communications (ICCC) 2017
DOI: 10.1109/compcomm.2017.8322647
|View full text |Cite
|
Sign up to set email alerts
|

Prediction models for network multi-source dissemination of information based on multivariate chaotic time series

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…When compared with the back propagation (BP) neural network [23] and double hidden layer neural network, HPABE method is more accurate in estimating chaotic time series, which is at least 10 orders of magnitude higher than the above estimation method. Especially, compared with wavelet neural network (WNN) [24], the estimation accuracy of HPABE method can be 12–13 orders of magnitude higher. When HPABE method is compared with the radial base function (RBF) [25] method, the maximum error result obtained by HPABE method is smaller, and its accuracy can be 7–9 orders of magnitude higher.…”
Section: Simulation Analysismentioning
confidence: 99%
“…When compared with the back propagation (BP) neural network [23] and double hidden layer neural network, HPABE method is more accurate in estimating chaotic time series, which is at least 10 orders of magnitude higher than the above estimation method. Especially, compared with wavelet neural network (WNN) [24], the estimation accuracy of HPABE method can be 12–13 orders of magnitude higher. When HPABE method is compared with the radial base function (RBF) [25] method, the maximum error result obtained by HPABE method is smaller, and its accuracy can be 7–9 orders of magnitude higher.…”
Section: Simulation Analysismentioning
confidence: 99%
“…Over the last decade, CTSP has been applied to the study of blood glucose, disease, and gait in humans [5]- [7]. Besides, CTSP also has been applied to cyber-information tasks such as retweeting [8], information diffusion [9], and DoS and DDoS attack detection [10]. The application of CTSP in the real world is becoming more significant and more widespread.…”
Section: Introductionmentioning
confidence: 99%