Author of the publication

Research on Nonlinear Time Series Forecasting of Time-Delay NN Embedded with Bayesian Regularization.

, , , and . AICI, volume 5855 of Lecture Notes in Computer Science, page 379-388. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantity sensitive task allocation based on improved whale optimization algorithm in crowdsensing system., , , , , and . Concurr. Comput. Pract. Exp., (2023)Computational Experimental Study on Social Organization Behavior Prediction Problems., , , , , and . IEEE Trans. Comput. Soc. Syst., 8 (1): 148-160 (2021)A novel nonlinear time series forecasting of time-delay neural network., , , and . GrC, page 278-283. IEEE Computer Society, (2009)Research on Mobile User Dynamic Trust Model Based on Mobile Agent System., and . HCC, volume 10745 of Lecture Notes in Computer Science, page 538-549. Springer, (2017)Research on a Novel Data Mining Method Based on the Rough Sets and Neural Network., , , , and . AICI, volume 5855 of Lecture Notes in Computer Science, page 639-648. Springer, (2009)Research on analysis of convergence of an adaptive Ant Colony Optimization Algorithm.. ISKE, page 491-496. IEEE, (2008)A New Classification Method of Signature Network Node Based on Potential Space Projection., , , and . ICDM Workshops, page 628-633. IEEE, (2019)Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing., , , , , and . HCC, volume 11354 of Lecture Notes in Computer Science, page 169-180. Springer, (2018)Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack., , , , , , and . IEEE Access, (2018)Research on a Direct Adaptive Neural Network Control Method of Nonlinear Systems., , and . ICNC (1), volume 3610 of Lecture Notes in Computer Science, page 345-352. Springer, (2005)