Pub Date : 2021-11-25DOI: 10.1109/icicn52636.2021.9673810
Z. Lai, Zhaolin Zhang, Youjun Wu, Renhai Feng
With the continuous growth of coastal industry, port logistics and other demands, traditional regulatory means have been unable to cope with the complex situations of port vessel regulation. In view of the fact that some monitoring points have blind areas in harbor-border inspection, this paper uses Unmanned Aerial Vehicle (UAV) to build an efficient automatic early warning and control system for port business, then a geometric algorithm for transmitter positioning is proposed by taking Received Signal Strength (RSS) as intermediate variable in Visible Light Communication (VLC) scene. On this basis, in order to further improve the calculation speed and accuracy, Linear Iterative Positioning (LIP) algorithm based on Taylor expansion, implicit function theorem and time domain expansion is proposed to realize the identification and positioning of maritime targets. Furthermore, Quadratic Approximation Iterative Positioning (QAIP) a more sophisticated approximation of the original function is proposed for reference based on second-order Taylor expansion. Finally, simulation results show that the accuracy of LIP algorithm is higher than that of QAIP algorithm, and the computational complexity is low. In addition, the proposed algorithms have fixed overhead.
{"title":"Maritime Target Tracking Algorithm Based on Visible Light Communication","authors":"Z. Lai, Zhaolin Zhang, Youjun Wu, Renhai Feng","doi":"10.1109/icicn52636.2021.9673810","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673810","url":null,"abstract":"With the continuous growth of coastal industry, port logistics and other demands, traditional regulatory means have been unable to cope with the complex situations of port vessel regulation. In view of the fact that some monitoring points have blind areas in harbor-border inspection, this paper uses Unmanned Aerial Vehicle (UAV) to build an efficient automatic early warning and control system for port business, then a geometric algorithm for transmitter positioning is proposed by taking Received Signal Strength (RSS) as intermediate variable in Visible Light Communication (VLC) scene. On this basis, in order to further improve the calculation speed and accuracy, Linear Iterative Positioning (LIP) algorithm based on Taylor expansion, implicit function theorem and time domain expansion is proposed to realize the identification and positioning of maritime targets. Furthermore, Quadratic Approximation Iterative Positioning (QAIP) a more sophisticated approximation of the original function is proposed for reference based on second-order Taylor expansion. Finally, simulation results show that the accuracy of LIP algorithm is higher than that of QAIP algorithm, and the computational complexity is low. In addition, the proposed algorithms have fixed overhead.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127185934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1109/icicn52636.2021.9673848
S. Wang, Weili Zhang, Ning Yang, Yan-Rong Mou, Y. Rao
A high-power multimode random fiber laser (MM-RFL) is demonstrated with high spectral density and low spatial coherence by combing random fiber laser (RFL) with a multimode fiber (MMF) incorporated master oscillator power-amplifier (MOPA) configuration. The generated MM-RFL provides a maximum output power of 100.6 W and a 3-dB bandwidth of 0.4 nm. The introduction of MMF can achieve a speckle contrast of as low as 0.037. Furthermore, speckle-free imaging is also demonstrated using the MM-RFL at different output powers. Experimental result shows that the imaging quality can be improved with the increase of output power of the MM-RFL as its spatial coherence decreases with the increasing number of effective transverse modes excited in the MMF. This high-power low spatial coherence MM-RFL provides a suitable laser source for speckle-free imaging applications with high power requirement to realize high-quality imaging.
{"title":"Speckle-free Imaging Using a High-power Multimode Random Fiber Laser","authors":"S. Wang, Weili Zhang, Ning Yang, Yan-Rong Mou, Y. Rao","doi":"10.1109/icicn52636.2021.9673848","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673848","url":null,"abstract":"A high-power multimode random fiber laser (MM-RFL) is demonstrated with high spectral density and low spatial coherence by combing random fiber laser (RFL) with a multimode fiber (MMF) incorporated master oscillator power-amplifier (MOPA) configuration. The generated MM-RFL provides a maximum output power of 100.6 W and a 3-dB bandwidth of 0.4 nm. The introduction of MMF can achieve a speckle contrast of as low as 0.037. Furthermore, speckle-free imaging is also demonstrated using the MM-RFL at different output powers. Experimental result shows that the imaging quality can be improved with the increase of output power of the MM-RFL as its spatial coherence decreases with the increasing number of effective transverse modes excited in the MMF. This high-power low spatial coherence MM-RFL provides a suitable laser source for speckle-free imaging applications with high power requirement to realize high-quality imaging.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129871358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1109/icicn52636.2021.9673961
Yanzhi Huang, Xijun Wang, Xinghua Sun, Xiang Chen
In this paper, we consider a downlink wireless network, where a base station (BS) with stochastic arrivals transmits fresh status updates to different users over Markov channels. To quantity the freshness of information, a recently developed metric, called Age of Information (AoI), is used. We formulate a constrained optimization problem to find the optimal scheduling policy that minimizes the average weighted sum of the AoI at the user and the energy consumption at the BS. Due to the hardness of this problem, we recast it as a Restless Multi-Armed Bandit (RMAB) problem and decouple the problem into multiple sub-problems. After deriving the structural property of the optimal policy for the sub-problem, we establish the indexability of the sub-problem and design an algorithm to compute the Whittle’s index. Finally, we propose a scheduling policy based on the Whittle’s index. Simulation results demonstrate that our proposed scheduling policy performs comparably with the optimal policy.
{"title":"Timely Status Updating over Markov Channels in Downlink Wireless Networks with Stochastic Arrivals","authors":"Yanzhi Huang, Xijun Wang, Xinghua Sun, Xiang Chen","doi":"10.1109/icicn52636.2021.9673961","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673961","url":null,"abstract":"In this paper, we consider a downlink wireless network, where a base station (BS) with stochastic arrivals transmits fresh status updates to different users over Markov channels. To quantity the freshness of information, a recently developed metric, called Age of Information (AoI), is used. We formulate a constrained optimization problem to find the optimal scheduling policy that minimizes the average weighted sum of the AoI at the user and the energy consumption at the BS. Due to the hardness of this problem, we recast it as a Restless Multi-Armed Bandit (RMAB) problem and decouple the problem into multiple sub-problems. After deriving the structural property of the optimal policy for the sub-problem, we establish the indexability of the sub-problem and design an algorithm to compute the Whittle’s index. Finally, we propose a scheduling policy based on the Whittle’s index. Simulation results demonstrate that our proposed scheduling policy performs comparably with the optimal policy.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134627903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1109/icicn52636.2021.9673972
Chrysi K. Metallidou, K. Psannis, S. Goudos, P. Sarigiannidis, Y. Ishibashi
This era is characterized by the rapid evolution of technology and its application in all sectors of day to day life. At the same time, the outbreak of the COVID-19 pandemic has highlighted the distance education as vital, compulsory and worldwide, for Educational Institutions. The attainments of technology are set at the service of education and the problem of security and privacy in online learning is emerged. This paper focuses on the development of a secure online learning system, which utilizes edge computing and privacy mechanisms, such as trust evaluation from direct and indirect observations. The proposed system provides to the Educational Institutions the advantage of conducting online courses, by ensuring privacy in communication for students, professors and the organization.
{"title":"Communication and Security Issues in Online Learning during the COVID-19 Pandemic","authors":"Chrysi K. Metallidou, K. Psannis, S. Goudos, P. Sarigiannidis, Y. Ishibashi","doi":"10.1109/icicn52636.2021.9673972","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673972","url":null,"abstract":"This era is characterized by the rapid evolution of technology and its application in all sectors of day to day life. At the same time, the outbreak of the COVID-19 pandemic has highlighted the distance education as vital, compulsory and worldwide, for Educational Institutions. The attainments of technology are set at the service of education and the problem of security and privacy in online learning is emerged. This paper focuses on the development of a secure online learning system, which utilizes edge computing and privacy mechanisms, such as trust evaluation from direct and indirect observations. The proposed system provides to the Educational Institutions the advantage of conducting online courses, by ensuring privacy in communication for students, professors and the organization.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129476366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1109/icicn52636.2021.9673857
Shoushan Wang, Guobin Pu, Chuan Jin, Tao Zhang
In passively mode-locking fiber lasers, bismuthene used as the saturable absorber (SA) paves a brand-new way for the ultra-short pulses’ generation. Based on the coupled nonlinear Schrödinger equation (CNLSE), the generation and transmitting characteristics of ultrafast pulse are studied in details, especially, the influence of the second-order dispersion on the pulse width, energy and spectrum. In this work, through changing the group velocity dispersion (from 0.03 $mathrm{p}mathrm{s}^{2}/mathrm{k}mathrm{m}$ to $0.09mathrm{p}mathrm{s}^{2}/mathrm{k}mathrm{m})$, the pulse width and energy increase with the increase of the dispersion. The results from this work can be regarded as guidance when designing a wave-breaking-free fiber laser and also provide a theoretical basis for the experimental control of pulse width and energy.
{"title":"Theoretical Analyses of Pulse Evolution in a Passively Mode-Locked Laser","authors":"Shoushan Wang, Guobin Pu, Chuan Jin, Tao Zhang","doi":"10.1109/icicn52636.2021.9673857","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673857","url":null,"abstract":"In passively mode-locking fiber lasers, bismuthene used as the saturable absorber (SA) paves a brand-new way for the ultra-short pulses’ generation. Based on the coupled nonlinear Schrödinger equation (CNLSE), the generation and transmitting characteristics of ultrafast pulse are studied in details, especially, the influence of the second-order dispersion on the pulse width, energy and spectrum. In this work, through changing the group velocity dispersion (from 0.03 $mathrm{p}mathrm{s}^{2}/mathrm{k}mathrm{m}$ to $0.09mathrm{p}mathrm{s}^{2}/mathrm{k}mathrm{m})$, the pulse width and energy increase with the increase of the dispersion. The results from this work can be regarded as guidance when designing a wave-breaking-free fiber laser and also provide a theoretical basis for the experimental control of pulse width and energy.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129594572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1109/icicn52636.2021.9673978
Lixia Xi, Jiacheng Wei, Wenbo Zhang
Nonlinear frequency division multiplexing system becomes one of the promising candidates for overcoming the fiber’s nonlinearity limitations. To improve the system’s performance, machine learning was introduced to the NFDM systems in the past few years. In this paper, an overview on the applications of machine learning in the NFDM systems is presented.
{"title":"Applications of Machine Learning on Nonlinear Frequency Division Multiplexing Optic-Fiber Communication Systems","authors":"Lixia Xi, Jiacheng Wei, Wenbo Zhang","doi":"10.1109/icicn52636.2021.9673978","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673978","url":null,"abstract":"Nonlinear frequency division multiplexing system becomes one of the promising candidates for overcoming the fiber’s nonlinearity limitations. To improve the system’s performance, machine learning was introduced to the NFDM systems in the past few years. In this paper, an overview on the applications of machine learning in the NFDM systems is presented.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129283783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1109/icicn52636.2021.9673839
Y. Zhong, L. Wan
Aiming at the optimal adjustment of unmanned communication relay nodes (UCRNs) problem in manned/ unmanned aerial vehicle cooperative engagement system, this paper established a two–layer mathematical model to describe it and solved it through a greedy distributed model predictive control (GDMPC) and multi–objective artificial bee colony (MOABC) method. Problem description and element definition, kinematic model of unmanned communication relay nodes, modeling of the problem, GDMPC framework and subsystem optimization solution based on MOABC were in sequence presented, and finally, simulation experiments were carried on to verify the correctness of the model and the effectiveness of the algorithm.
{"title":"Optimal Adjustment of UCRNs in Cooperative Engagement System Based on GDMPC-MOABC","authors":"Y. Zhong, L. Wan","doi":"10.1109/icicn52636.2021.9673839","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673839","url":null,"abstract":"Aiming at the optimal adjustment of unmanned communication relay nodes (UCRNs) problem in manned/ unmanned aerial vehicle cooperative engagement system, this paper established a two–layer mathematical model to describe it and solved it through a greedy distributed model predictive control (GDMPC) and multi–objective artificial bee colony (MOABC) method. Problem description and element definition, kinematic model of unmanned communication relay nodes, modeling of the problem, GDMPC framework and subsystem optimization solution based on MOABC were in sequence presented, and finally, simulation experiments were carried on to verify the correctness of the model and the effectiveness of the algorithm.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128842067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1109/icicn52636.2021.9673988
Vasileios A. Memos, Konstantinos E. Psannis, Y. Ishibashi
In this research work, we investigate the effects of cybercrime and focus on concerns about cybercrime expansion. Since black-hat hackers are constantly one step ahead of white-hat hackers and exploit new sophisticated hack-tools to intrude to devices and networks to commit cybercrime for different reasons, the utilization of the available emerging technologies can provide better privacy and protection level, while they can be used to combat cybercriminal attacks. This shift to new technologies and methods is regarded to be an urgent necessity today. Therefore, we demonstrate a potential novel security mechanism for Police Authorities, named “Artificial Intelligence ANTi-Attack System” or simply “AIANTAS” that aspires to improve the detection rate of cybercriminals and lead to their faster arrest. This model can be integrated into the other National Security defense mechanisms both in Greece and worldwide.
{"title":"(AIANTAS) for IoT Cyberspace —An Upcoming Cloud-based Security Architecture for Police Authorities","authors":"Vasileios A. Memos, Konstantinos E. Psannis, Y. Ishibashi","doi":"10.1109/icicn52636.2021.9673988","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673988","url":null,"abstract":"In this research work, we investigate the effects of cybercrime and focus on concerns about cybercrime expansion. Since black-hat hackers are constantly one step ahead of white-hat hackers and exploit new sophisticated hack-tools to intrude to devices and networks to commit cybercrime for different reasons, the utilization of the available emerging technologies can provide better privacy and protection level, while they can be used to combat cybercriminal attacks. This shift to new technologies and methods is regarded to be an urgent necessity today. Therefore, we demonstrate a potential novel security mechanism for Police Authorities, named “Artificial Intelligence ANTi-Attack System” or simply “AIANTAS” that aspires to improve the detection rate of cybercriminals and lead to their faster arrest. This model can be integrated into the other National Security defense mechanisms both in Greece and worldwide.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129487538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
When the UAV technology meets the multiple-input-multiple-output communications, the precoders for transmission need to fertilize the benefits of high-probability lineof-sight propagation paths. This work investigates the joint design of uplink/downlink precoders for single-cell UAV-mounted wireless systems. While the UAV has finite cruising endurance, the UAV-mounted base transceiver station can scavenge energy from wireless signals in the uplink period, and the deliver useful information to terrestrial users in the downlink period. By exploit the information-theoretical uplink-downlink duality, the weighted throughput can be maximized based on the tailored dirty paper coding scheme. Numerical results are used to demonstrated the effectiveness of the proposed algorithm.
{"title":"Dirty Paper Coding Based Weighted Throughout Maximization for UAV-Mounted Wireless Systems","authors":"Luya Wang, Vidal Yanjie Dong, Ying He, Jianqiang Li, V. Leung","doi":"10.1109/icicn52636.2021.9673997","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673997","url":null,"abstract":"When the UAV technology meets the multiple-input-multiple-output communications, the precoders for transmission need to fertilize the benefits of high-probability lineof-sight propagation paths. This work investigates the joint design of uplink/downlink precoders for single-cell UAV-mounted wireless systems. While the UAV has finite cruising endurance, the UAV-mounted base transceiver station can scavenge energy from wireless signals in the uplink period, and the deliver useful information to terrestrial users in the downlink period. By exploit the information-theoretical uplink-downlink duality, the weighted throughput can be maximized based on the tailored dirty paper coding scheme. Numerical results are used to demonstrated the effectiveness of the proposed algorithm.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128759906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1109/icicn52636.2021.9673834
K. Hu, Xiang Ji, Jie Xie, Jingmin Yu
Traditional price movement is modeled by the machine learning methods and neural network methods. However, the prediction is often concerned with the correlations rather than the causality. In this paper, we do not only consider the correlation but also borrow the idea of the Neural Hawkes model to help build the decaying effects between the stock price dynamics. In the work, we evaluate the prediction quality of the results using the log likelihood. Results show that our methods are competitive, the Neural Hawkes model achieved log likelihood value of seq (combining the time and type) to -0.6358 and -2.3878 in five days prediction and ten days prediction respectively, better than -4.3243 and -4.5841 by Hawkes model and -11.353 and -24.8147 by Inhibition Hawkes model.
{"title":"Modeling Movement Behavior of Stock Price Using Neural Hawkes Model","authors":"K. Hu, Xiang Ji, Jie Xie, Jingmin Yu","doi":"10.1109/icicn52636.2021.9673834","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673834","url":null,"abstract":"Traditional price movement is modeled by the machine learning methods and neural network methods. However, the prediction is often concerned with the correlations rather than the causality. In this paper, we do not only consider the correlation but also borrow the idea of the Neural Hawkes model to help build the decaying effects between the stock price dynamics. In the work, we evaluate the prediction quality of the results using the log likelihood. Results show that our methods are competitive, the Neural Hawkes model achieved log likelihood value of seq (combining the time and type) to -0.6358 and -2.3878 in five days prediction and ten days prediction respectively, better than -4.3243 and -4.5841 by Hawkes model and -11.353 and -24.8147 by Inhibition Hawkes model.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125118383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}