Home Research on the application of search algorithm in computer communication network
Article Open Access

Research on the application of search algorithm in computer communication network

  • Hua Ai EMAIL logo , Jianwei Chai , Jilei Zhang , Shaweta Khanna and Kayhan Zrar Ghafoor
Published/Copyright: October 31, 2022
Become an author with De Gruyter Brill

Abstract

This article mitigates the challenges of previously reported literature by reducing the operating cost and improving the performance of network. A genetic algorithm-based tabu search methodology is proposed to solve the link capacity and traffic allocation (CFA) problem in a computer communication network. An efficient modern super-heuristic search method is used to influence the fixed cost, delay cost, and variable cost of a link on the total operating cost in the computer communication network are discussed. The article analyses a large number of computer simulation results to verify the effectiveness of the tabu search algorithm for CFA problems and also improves the quality of solutions significantly compared with traditional Lagrange relaxation and subgradient optimization algorithms. The experimental results show that with the increase of the weighted coefficient of variable cost, the proportion of variable cost in the total cost increases from 10 to 35%. The growth is relatively slow, and the fixed cost is still the main component. In addition, due to the increase in the variable cost, the tabu search algorithm will also choose the link with large luxury to reduce the variable cost, which makes the fixed cost slightly increase, while the network delay cost and average delay slightly decrease. The proposed method, when compared with the genetic algorithm, has more advantages for large-scale or heavy-load networks.

1 Introduction

With the development of information technology, computer communication networks have been widely used in various fields. When designing and optimizing computer communication networks, link capacity allocation and message routing (i.e., link traffic distribution) are important issues that need to be considered [1]. Reasonably to solve the problem of capacity and flow distribution (CFA) in computer communication networks (Figure 1), it is of great significance for reducing network operating costs, reducing the average delay of the network, and improving the cost–performance ratio of the network [2]. With the rapid development of mobile communications, competition among operators has become increasingly fierce, and the pace of network construction is quite fast, so that part of the network is put into operation without adjustment; this causes some waste of resources or insufficient resource allocation, which affects the quality of the user’s call. However, in mobile communication networks, the most important resource is the frequency resource. At present, the limited frequency resources are becoming tenser; therefore, the rational use of spectrum resources affects the development of mobile communications [3].

Figure 1 
               Capacity and flow distribution in the computer communication network.
Figure 1

Capacity and flow distribution in the computer communication network.

In recent years, there is a continuous advancement in the IT sector with significant expansion in networking. There have been a large number of software as well as applications that play different roles in this domain [4,5]. Such applications are specifically data-driven, and the users are able to generate big data by using these applications. There is a rapid growth of data which is to be detected effectively [6].

The state-of-the-artwork in the field of data optimization has several shortcomings, like increased operational cost and reduced network performance. This article is highly motivated to mitigate these challenges by reducing the operating cost and improve the performance of the network. An efficient modern super-heuristic search genetic algorithm-based tabu search methodology solves the link CFA problem in a computer communication network that influences the fixed cost, delay cost, and variable cost of link on total operating cost. This work saves costs and improves profits, and it was decided to optimize the existing GSM network. The data of the computer communication network is analyzed, and the frequency resources are allocated reasonably according to the analysis results. The optimal carrier frequency allocation scheme can improve the utilization rate of wireless channels, save money, increase profits, and obtain the best benefits. A reasonable carrier frequency allocation scheme is of great significance to the optimization of the network. The design and optimization of computer communication networks and a large number of other nonlinear combinatorial optimization problems provide a new idea and method. In the planning, design, performance optimization, and evaluation of computer communication networks and other networks such as telecommunications, power, and transportation. It has important theoretical and practical value and broad application prospects. The article observes a large number of computer simulation results to verify the effectiveness of the tabu search algorithm for CFA.

2 Literature review

Peker et al. used the traditional Lagrangian relaxation and sub-gradient optimization algorithm to study the CFA problem [7]. Ma et al. made improvements to this algorithm [8]. However, Tanaka et al. believed that, in essence, the optimization of the CFA problem is a non-linear programming problem with multiple constraints; it belongs to the complete category of NP in combinatorial optimization using traditional mathematical optimization methods; the solution process is relatively complicated; and the quality of the solution is not ideal, which can no longer meet the needs of actual engineering [9]. In recent years, modern hyper-heuristic algorithms represented by simulated annealing, genetic algorithm, tabu search, and artificial neural network have been extensively researched and applied. He et al. used genetic algorithms to solve CFA problems and proved the feasibility of genetic algorithms, and a more satisfactory result was obtained [10]. Wei et al. believed that cellular mobile communication adopts frequency reuse technology, and the frequency utilization rate has been improved, the system capacity has been increased, and the network has realized handover and roaming functions; the scope of customer service has also expanded [11]. Therefore, Zhou et al. established a public system in order to allow mobile phones to be used uniformly [12]. Xu et al. proposed the concept of tabu search for the first time and then formed a complete set of algorithms; in recent years, it has been greatly developed and received much attention [13]. Changming et al. considered the tabu search algorithm to be a restrictive local search technique. Its basic idea is to record the local optimal points that have been reached through a taboo table, and in the next search, use the information in the taboo table to no longer or selectively search for these points in order to avoid the local optimal solution [14]. The current GSM network also introduces the General Packet Radio Service (GPRS), which is a brand-new data transmission service based on the existing (Group Special Mobile, GSM) network. Some devices have been added to the network, such as service GPRS support nodes and gateway GPRS support nodes, which can realize FTP file transfer, web browsing, and other services. With the rapid development of GPRS services, the existing transmission rate cannot meet the needs of services, so EDGE technology has also been introduced. The introduction of EDGE technology does not change the structure of the entire GSM network. This technology adopts a new modulation technology to make the data transmission rate faster.

Tabu search algorithm, an efficient modern super-heuristic search method, is used for the first time to solve the link CFA problem in the computer communication network. Then, the influence of fixed cost, delay cost, and variable cost of the link on the total operating cost in the computer communication network is discussed. Finally, a large number of computer simulation results not only verify the effectiveness of the tabu search algorithm for CFA problems but also improve the quality of solutions significantly compared with traditional Lagrange relaxation and subgradient optimization algorithms. This paper not only provides new ideas and methods for the design and optimization of computer communication networks, but also provides new ideas and methods for the planning, design, performance optimization and evaluation of telecommunications, power, transportation and other networks. It has important theoretical and practical value and broad application prospects.

3 Materials and methods

This section provides the description of the network communication optimization approach in search algorithms.

3.1 Network communication optimization in search algorithms

Network optimization refers to the investigation and analysis of network data after the existing network is officially put into operation, and then the network is reasonably adjusted according to the analysis results. Through the collection of traffic data of the base station, voice test, drive test, carrier frequency planning of the cell, etc., to investigate. Then it carry out statistics, analysis and summarization on the acquired data. This work finds out the problem that affects the quality of the network and works out the corresponding network adjustment plan. Then adjust the parameters of the base station and switching network according to the plan. The ultimate goal is to make the operation of the network reach the best state, so that the existing network resources can be better and fully utilized, and the best benefits can be obtained [15]. Traditional network construction ideas are divided into three stages: planning, engineering construction, and maintenance; the most important part of maintenance is network optimization, and it is the work carried out on the basis of daily maintenance. It is different from planning and engineering construction, but it is closely connected with planning and engineering construction. Network optimization is a very complex and recurring task. All expansions and network adjustments since the network was successfully constructed and put into operation, all are part of network optimization. With the expansion of the network scale and the increase in the number of users, the construction of indoor stations and the introduction of micro-cell technology, the task of network optimization is even more arduous [16].

The main process of network optimization is to conduct system investigation, data collection and analysis, formulate an optimization plan, and implement an optimization plan, and the process is shown in Figure 2.

Figure 2 
                  Network optimization process.
Figure 2

Network optimization process.

In the mobile communication network, an index to judge the quality of a network mainly include connection rate, channel utilization, drop rate, congestion rate, traffic volume, carrier frequency configuration number, traffic volume per line, etc.; these are the key points of data collection for traffic statistics [17]. Taboo table plays a very important role in taboo search. A long T max queue, as shown in Figure 3, is used to represent a taboo table.

  1. OMC data collection

    Collect relevant data about BSS and NSS in OMC, such as the number of base stations, system messages, neighbor cell configuration, power control, and other data.

  2. Other data collection

    If you want to fully understand a network, in addition to collecting the above-mentioned data, it also requires mobile phone calls to test, drive test, antenna data, and customer service to accept customer complaints. Combining all the data can make a comprehensive analysis of the status of the network.

Figure 3 
                  The structure of the taboo table.
Figure 3

The structure of the taboo table.

3.2 Search algorithm

The basic harmony search algorithm is continuous, however, for a typical combinatorial optimization problem such as channel allocation is a discrete space [18]; therefore, it is necessary to use the harmony search algorithm to allocate the channels, and the harmony search algorithm must be discretized. Among them, the harmonic generation operation in the discrete domain is shown in formula (1):

(1) X = HMCR ( g X 1 , X 2 , X n ) , X n ) ,

where X′ stands for the temporary solution, h(x) represents a new individual generated by exchanging information between two harmony variables, and g means that all the solutions in the harmony memory bank interact to produce a new harmony.

In the discrete domain, the harmonic disturbance operation is performed according to equation (2):

(2) X = PAR F ( X m ) = F ( X m ) if ( r < PAR ) X m otherwise .

Among them, the function F(X′) represents the perturbation operation of the individual independent variable.

Because the basic harmony algorithm has unstable convergence, and it is easy to fall into the defect of local optimal solution, in order to improve the stability of the searched global optimization solution [19], at the same time, the robustness and universality of the algorithm are enhanced, and the following improvements are made to the discrete harmony search algorithm:

Dynamically adjust HMCR and PAR according to formulas (3) and (4).

(3) HMCR = HMCR min + HMCR max HMCR min NI × n ,

(4) PAR = PAR max PAR max PAR min NI × n .

The steps for applying the improved harmony search algorithm to the frequency allocation problem are as follows:

  1. Initialize the parameters, set the size HMS of the harmony library, the number of iterations Ite, the maximum HMCRmax and minimum HMCRmin of the retention probability of harmony memory, the maximum value PARmax and minimum value PARmin of the syllable adjustment probability.

  2. Initialize the population, calculate fitness according to the objective function, if the calculation result is 0, exit and output the result. Otherwise step 3 will be executed.

  3. Use the three rules of HMCR, PAR and random selection to generate each harmony variable.

  4. Calculate the fitness value again. If the calculation result is 0, exit the algorithm and output the result. Otherwise, repeat step (3).

  5. The algorithm ends when the conditions for the end of the algorithm are met.

4 Computer simulation experiment results and discussion

4.1 Computer simulation experiment

For the sake of comparison, the experimental objects adopt ARPA net and RING net, the number on the link is the length in km, and the number in the box represents the node number [20]. The ARPA network has 21 nodes (420 communication node pairs), 26 links, and the communication volume between each node pair is 4 packets/s; The RING network has a total of 32 nodes (992 communication node pairs), there are 60 links, and the communication volume between each node pair is 1 min/s and 4 packets/s, respectively. The candidate routes between each pair of nodes are selected as five, which are generated in advance by the route generation program, and numbered from 0 to 4 according to the path length. Table 1 shows the candidate link capacity and its cost.

Table 1

Link capacity and its cost

Link capacity (bps) Fixed cost (yuan) Distance cost (yuan km−1) Traffic cost (yuan bps−1)
4,800 650 0.4 0.360
9,600 750 0.5 0.252
19,200 850 2.1 0.126
50,000 850 2.1 0.030
10,800 2,400 4.2 0.020
232,000 1,300 21 0.017
460,000 1,300 60 0.023

4.2 Analysis of simulation results

Table 2 shows the different packet lengths, experimental results of computer simulation with network operating expenses. Among them, D = 2,000 yuan/(month group), G = V = 1. The network delay cost and the total network cost obtained by the author’s method are both small, that is, the performance–price ratio of the entire network is higher; especially in the RING network [21], the total network cost is reduced by 60%. Comparing the results, in the ARPA network, the result of the author’s method is similar to the optimization result of genetic algorithm; and in the RING network, the network delay cost and the total network cost are both small, and the total network cost is reduced by 5%. It can also be seen from the table that the algorithm is more superior to large-scale or heavy-loaded networks.

Table 2

Experimental results of computer simulation under different packet lengths

Network type Packet length/bit Total network cost Fixed costs Delay fee Variable cost
ARPA 200 180,920 36,184 113,900 30,756
300 234,638 49,274 140,783 44,851
400 308,129 71,785 184,674 51,199
500 341,427 75,900 204,084 63,443
RING 300 211,976 44,807 232,268 27,842
400 248,614 57,585 156,429 34,600
500 280,602 53,695 186,975 39,632
600 306,929 56,494 205,034 43,642

Figure 4 shows that when the units are grouped in the RING network, the impact of the change in the weighting coefficient of the delay cost on the various operating costs of the network, the average packet length is 400 bits, and G = V = 1. As can be seen from Figure 4, with the increase of the weighting coefficient of the unit grouping delay cost, the total network cost, delay cost, and fixed cost are also increasing [22]. When the weighting coefficient is very low (such as 0), it means that the packet delay, that is, the real-time performance of the network is not important; therefore, in the optimization process, the tabu search algorithm will select a link with a smaller capacity, in order to reduce the fixed cost of the link, the average delay of the network is very high. When the weighting coefficient increases, too high delay will increase the delay cost; at this time, the algorithm will select a large-capacity link, in order to reduce the increasing network cost due to the increase of delay cost [23,24,25]. At the same time, due to the increase in link capacity, the fixed cost will increase, the average delay of the network will continue to drop, and the real-time performance of the network will be improved. In the process of increasing the weighting coefficient of the unit grouping delay cost, the proportion of latency costs to the total network costs continues to increase, increase from 0 to about 20%; fixed link costs still account for the main share, but its proportion dropped slightly from 75 to about 65%. The variable cost has not changed very much, but due to the gradual increase in link capacity, through route optimization, the traffic of the link is reduced, and the variable cost is also slightly reduced.

Figure 4 
                  Computer simulation results of the weighting coefficients of different unit grouping delay costs.
Figure 4

Computer simulation results of the weighting coefficients of different unit grouping delay costs.

Figure 5 shows the changes in the weighting coefficient of fixed costs in the RING network, the impact on network costs. Among them, D = 2,000 yuan/(month group), the average packet length is 400 bits, and V = 1. As can be seen from Figure 5, the fixed cost weighting coefficient has a great influence on the total network cost. When this weighting coefficient is very low, the delay cost accounts for a considerable proportion of the total cost, in order to reduce the total cost in the optimization process, the tabu search algorithm, tend to choose large-capacity links to reduce network delay costs, this also reduces the average delay of the network, real-time performance is improved. When this weighting factor increases, the fixed cost of the link continues to rise, the proportion is gradually increasing, in order to reduce the total cost, the algorithm can only select links with small capacity, by reducing the fixed cost, the total cost is reduced, but at the same time, the average delay increases and the real-time performance of the network deteriorates. At the same time, the reduction of link capacity will lead to an increase in the traffic cost coefficient. At this time, the traffic volume in the link will increase relatively, and the variable cost has a slight upward trend, but the change is not significant. This shows that the routing strategy is not greatly affected by the weighted coefficient of the fixed cost. With the increase in the weighting coefficient of fixed costs, the proportion of fixed costs in the total network costs is increasing, the proportion of delay costs is gradually decreasing, and the proportion of variable costs has declined. In these two networks, when the fixed cost weighting coefficient is 0.1, delay fees, fixed fees, and variable fees account for 23, 35, and 42% of the total cost, respectively, when the coefficient increases to 2.0, its proportions are about 19, 70, and 11%, respectively.

Figure 5 
                  Computer simulation results of different weighted coefficients of fixed costs.
Figure 5

Computer simulation results of different weighted coefficients of fixed costs.

Figure 6 shows the RING network, the impact of the change of the variable cost weighting coefficient on various network costs, where D = 2,000 yuan/(month group), the average packet length is 400 bits, V = 1. As can be seen from Figure 6, with the increase of the variable cost weighting coefficient, the proportion of variable cost in the total cost has increased from 10% to about 35%, the growth is relatively slow, fixed costs are still the main component. In addition, due to the increase in the proportion of variable costs, the tabu search algorithm will also choose a larger amount of extravagant links to reduce the variable cost, which makes the fixed cost slightly increase; the delay cost and average delay of the network showed a slight downward trend. However, in general, the change of the weighting coefficient does not have a great impact on the delay cost, fixed cost, and average delay, increasing this coefficient will not cause the redistribution of the entire network traffic, that is, the routing strategy will not undergo major adjustments. Obviously, the variable cost in Figure 6 has a roughly linear growth relationship with its weighting coefficient, while the growth of the total network cost is basically due to the increase in variable costs.

Figure 6 
                  Computer simulation results of different variable cost weighting coefficients.
Figure 6

Computer simulation results of different variable cost weighting coefficients.

5 Conclusion

This article proposes an efficient modern super-heuristic search method which is used for the first time to solve the link CFA problem in the computer communication network. The influence of fixed cost, delay cost, and variable cost of link on total operating cost in computer communication network is discussed. This article uses a large number of computer simulation results not only to verify the effectiveness of the tabu search algorithm for CFA problems but also to improve the quality of solutions significantly compared with traditional Lagrange relaxation and subgradient optimization algorithms. The design and optimization of computer communication networks and a large number of other nonlinear combinatorial optimization problems provide a new idea and method. Moreover, in the planning, design, performance optimization, and evaluation of computer communication networks and other networks such as telecommunications, power, and transportation, it has important theoretical and practical value and broad application prospects.

This paper has successfully improved the artificial fish swarm algorithm and the harmony search algorithm and applied it to the problem of frequency allocation and achieved good results. However, as a new algorithm, it is not very mature, so its development will take a long time, and there is still a lot of room for improvement. Based on the previous experimental results, the following conclusions are drawn:

  1. The two improved algorithms proposed in this paper are used in the problem of frequency allocation and have strong solving ability.

  2. However, the future scope of this article lies in the development of an optimized approach, which further provide improved network performance, and there is still a lot of room for development.

  1. Funding information: This work was funded by the Science and Technology Research and Development Plan of Langfang in 2021, “Research on collaborative innovation development path of Beijing-Tianjin-Hebei Artificial intelligence industry,” Project No.: 2021029060.

  2. Conflict of interest: The authors declare that they have no competing interest.

  3. Informed consent: Informed consent was obtained from all individuals included in this study.

  4. Data availability statement: The dataset and stimuli of this study are available upon reasonable request from the corresponding author.

References

[1] Ahmad A, Razali S, Mohamed ZS, El-Shafie A. The application of artificial bee colony and gravitational search algorithm in reservoir optimization. Water Resour Manag. 2016;30(7):2497–516.10.1007/s11269-016-1304-zSearch in Google Scholar

[2] Hao L, Chen T, Yu J. Research on the application of cordic algorithm in the field of space-borne on-board signal processing. Proc Comput Sci. 2021;183(3):361–71.10.1016/j.procs.2021.02.072Search in Google Scholar

[3] He S, Shen X, Yang Y, He R, Yan W. Research on mri brain segmentation algorithm with the application in model-based eeg/meg. IEEE Trans Magnetics. 2001;37(5):3741.10.1109/20.952703Search in Google Scholar

[4] Huang TS, Li X, Cao Q. Research on an evaluation algorithm of sensing node reliability in cognitive networks. IEEE Access. 2020;8:11848–55.10.1109/ACCESS.2020.2965292Search in Google Scholar

[5] Hu X, Zhao J, Seet BC, Leung V, Chu T, Chan H. S-aframe: Agent-based multilayer framework with context-aware semantic service for vehicular social networks. IEEE Trans Emerg Top Comput. 2015;3(1):44–63.10.1109/TETC.2015.2395959Search in Google Scholar

[6] Tanaka Y, Berlage O. A fast dynamic algorithm for storage allocation in telecommunication networks. IEICE Trans Commun. 2018;78(7):1025–32.Search in Google Scholar

[7] Peker M, En B, Delen D. Computer-aided diagnosis of parkinson’s disease using complex-valued neural networks and mrmr feature selection algorithm. J Healthc Eng. 2015;6(3):281–302.10.1260/2040-2295.6.3.281Search in Google Scholar PubMed

[8] Ma Y, Li L, Yin Z, Chai A, Bi Z. Research and application of network status prediction based on bp neural network for intelligent production line. Proc Computer Sci. 2021;183(20):189–96.10.1016/j.procs.2021.02.049Search in Google Scholar

[9] Lim S, Lee WC, Cao G, Das CR. Cache invalidation strategies for internet-based mobile ad hoc networks. Comput Commun. 2012;30(8):1854–69.10.1016/j.comcom.2007.02.020Search in Google Scholar

[10] He S, Shen X, Yang Y, He R, Yan W. Research on mri brain segmentation algorithm with the application in model-based EEG/MEG. IEEE Trans Magnetics. 2021;37(5):3741–4.10.1109/20.952703Search in Google Scholar

[11] Wei P, Zhen Z. Research on security of information sharing in internet of things based on key algorithm. Future Gener Comput Syst. 2018;88(NOV):599–605.10.1016/j.future.2018.04.035Search in Google Scholar

[12] Zhou W, Yu S. Research on the communication method of mobile network shadow fading based on interference alignment algorithm. J Supeuting. 2016;72(7):2891–909.10.1007/s11227-016-1705-zSearch in Google Scholar

[13] Xu L, Tan GZ, Xia Z. Probabilistic inference-based service level objective-sensitive virtual network reconfiguration. Comput Commun. 2015;57:25–36.10.1016/j.comcom.2014.10.005Search in Google Scholar

[14] Changming JI, Chuangang LI, Liu X, Wang B, Zhang P. Research and application of dynamic programming algorithm in reservoir operation based on functional analysis. J Hydraulic Eng. 2016;47(1):1–9.Search in Google Scholar

[15] Cui Y, Chen S, Meng QU, Shanhong HE. Research and application of new threshold de-noising algorithm for monitoring data analysis in nuclear power plant. J Shanghai Jiaotong Univ. 2017;22(3):355–60.10.1007/s12204-017-1843-3Search in Google Scholar

[16] Castano F, Bourreau E, Velasco N, Rossi A, Sevaux M. Exact approaches for lifetime maximization in connectivity constrained wireless multi-role sensor networks. Eur J Oper Res. 2015;241(1):28–38.10.1016/j.ejor.2014.08.013Search in Google Scholar

[17] Steiner T, Verborgh R, Gabarro J, Mannens E, Walle R. Clustering media items stemming from multiple social networks. Comput J. 2015;58(9):1861.10.1093/comjnl/bxt147Search in Google Scholar

[18] Xiao J, Liu Z, Yang H, Hu X. The invariant features-based target tracking across multiple cameras. Multimed Tools Appl. 2017;76(10):1–15.10.1007/s11042-015-3067-6Search in Google Scholar

[19] Ali W, Li Y, Ahmed N, Ali W, Kashif M. A novel application of pattern search algorithm for efficient estimation of channel state information in mimo network. Wirel Personal Commun. 2021;116(1):325–40.10.1007/s11277-020-07717-0Search in Google Scholar

[20] Jiang P, Li P. Research and application of a new hybrid wind speed forecasting model on bso algorithm. J Energy Eng. 2017;143(1):04016019.1–04016019.13.10.1061/(ASCE)EY.1943-7897.0000362Search in Google Scholar

[21] Qian P, Shang T, Gao Y, Ding G. Research on dynamic handover decision algorithm based on fuzzy logic control in mobile fso networks. Photonic Netw Commun. 2021;41(2):136–47.10.1007/s11107-020-00920-wSearch in Google Scholar

[22] Seref O, Razzaghi T, Xanthopoulos P. Weighted relaxed support vector machines. Ann Oper Res. 2017;249(1–2):1–37.10.1007/s10479-014-1711-6Search in Google Scholar

[23] Xu L, Zhou XZ, Li QM, Zhang XF. Energy-efficient resource allocation for multiuser ofdma system based on hybrid genetic simulated annealing. Soft Comput. 2017;21(14):3969–76.10.1007/s00500-016-2047-8Search in Google Scholar

[24] Zhou S, Meng X. A location and time-aware resource searching scheme in mobile p2p ad hoc networks. J Supercomputing. 2020;76(9):6809–33.10.1007/s11227-019-03139-3Search in Google Scholar

[25] Sharma A, Kumar R. Risk-energy aware service level agreement assessment for computing quickest path in computer networks. Int J Reliab Saf. 2019;13(1/2):96–124.10.1504/IJRS.2019.097019Search in Google Scholar

Received: 2021-12-02
Revised: 2022-05-04
Accepted: 2022-07-24
Published Online: 2022-10-31

© 2022 Hua Ai et al., published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Articles in the same Issue

  1. Research Articles
  2. Construction of 3D model of knee joint motion based on MRI image registration
  3. Evaluation of several initialization methods on arithmetic optimization algorithm performance
  4. Application of visual elements in product paper packaging design: An example of the “squirrel” pattern
  5. Deep learning approach to text analysis for human emotion detection from big data
  6. Cognitive prediction of obstacle's movement for reinforcement learning pedestrian interacting model
  7. The application of neural network algorithm and embedded system in computer distance teach system
  8. Machine translation of English speech: Comparison of multiple algorithms
  9. Automatic control of computer application data processing system based on artificial intelligence
  10. A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing
  11. Application of mining algorithm in personalized Internet marketing strategy in massive data environment
  12. On the correction of errors in English grammar by deep learning
  13. Research on intelligent interactive music information based on visualization technology
  14. Extractive summarization of Malayalam documents using latent Dirichlet allocation: An experience
  15. Conception and realization of an IoT-enabled deep CNN decision support system for automated arrhythmia classification
  16. Masking and noise reduction processing of music signals in reverberant music
  17. Cat swarm optimization algorithm based on the information interaction of subgroup and the top-N learning strategy
  18. State feedback based on grey wolf optimizer controller for two-wheeled self-balancing robot
  19. Research on an English translation method based on an improved transformer model
  20. Short-term prediction of parking availability in an open parking lot
  21. PUC: parallel mining of high-utility itemsets with load balancing on spark
  22. Image retrieval based on weighted nearest neighbor tag prediction
  23. A comparative study of different neural networks in predicting gross domestic product
  24. A study of an intelligent algorithm combining semantic environments for the translation of complex English sentences
  25. IoT-enabled edge computing model for smart irrigation system
  26. A study on automatic correction of English grammar errors based on deep learning
  27. A novel fingerprint recognition method based on a Siamese neural network
  28. A hidden Markov optimization model for processing and recognition of English speech feature signals
  29. Crime reporting and police controlling: Mobile and web-based approach for information-sharing in Iraq
  30. Convex optimization for additive noise reduction in quantitative complex object wave retrieval using compressive off-axis digital holographic imaging
  31. CRNet: Context feature and refined network for multi-person pose estimation
  32. Improving the efficiency of intrusion detection in information systems
  33. Research on reform and breakthrough of news, film, and television media based on artificial intelligence
  34. An optimized solution to the course scheduling problem in universities under an improved genetic algorithm
  35. An adaptive RNN algorithm to detect shilling attacks for online products in hybrid recommender system
  36. Computing the inverse of cardinal direction relations between regions
  37. Human-centered artificial intelligence-based ice hockey sports classification system with web 4.0
  38. Construction of an IoT customer operation analysis system based on big data analysis and human-centered artificial intelligence for web 4.0
  39. An improved Jaya optimization algorithm with ring topology and population size reduction
  40. Review Articles
  41. A review on voice pathology: Taxonomy, diagnosis, medical procedures and detection techniques, open challenges, limitations, and recommendations for future directions
  42. An extensive review of state-of-the-art transfer learning techniques used in medical imaging: Open issues and challenges
  43. Special Issue: Explainable Artificial Intelligence and Intelligent Systems in Analysis For Complex Problems and Systems
  44. Tree-based machine learning algorithms in the Internet of Things environment for multivariate flood status prediction
  45. Evaluating OADM network simulation and an overview based metropolitan application
  46. Radiography image analysis using cat swarm optimized deep belief networks
  47. Comparative analysis of blockchain technology to support digital transformation in ports and shipping
  48. IoT network security using autoencoder deep neural network and channel access algorithm
  49. Large-scale timetabling problems with adaptive tabu search
  50. Eurasian oystercatcher optimiser: New meta-heuristic algorithm
  51. Trip generation modeling for a selected sector in Baghdad city using the artificial neural network
  52. Trainable watershed-based model for cornea endothelial cell segmentation
  53. Hessenberg factorization and firework algorithms for optimized data hiding in digital images
  54. The application of an artificial neural network for 2D coordinate transformation
  55. A novel method to find the best path in SDN using firefly algorithm
  56. Systematic review for lung cancer detection and lung nodule classification: Taxonomy, challenges, and recommendation future works
  57. Special Issue on International Conference on Computing Communication & Informatics
  58. Edge detail enhancement algorithm for high-dynamic range images
  59. Suitability evaluation method of urban and rural spatial planning based on artificial intelligence
  60. Writing assistant scoring system for English second language learners based on machine learning
  61. Dynamic evaluation of college English writing ability based on AI technology
  62. Image denoising algorithm of social network based on multifeature fusion
  63. Automatic recognition method of installation errors of metallurgical machinery parts based on neural network
  64. An FCM clustering algorithm based on the identification of accounting statement whitewashing behavior in universities
  65. Emotional information transmission of color in image oil painting
  66. College music teaching and ideological and political education integration mode based on deep learning
  67. Behavior feature extraction method of college students’ social network in sports field based on clustering algorithm
  68. Evaluation model of multimedia-aided teaching effect of physical education course based on random forest algorithm
  69. Venture financing risk assessment and risk control algorithm for small and medium-sized enterprises in the era of big data
  70. Interactive 3D reconstruction method of fuzzy static images in social media
  71. The impact of public health emergency governance based on artificial intelligence
  72. Optimal loading method of multi type railway flatcars based on improved genetic algorithm
  73. Special Issue: Evolution of Smart Cities and Societies using Emerging Technologies
  74. Data mining applications in university information management system development
  75. Implementation of network information security monitoring system based on adaptive deep detection
  76. Face recognition algorithm based on stack denoising and self-encoding LBP
  77. Research on data mining method of network security situation awareness based on cloud computing
  78. Topology optimization of computer communication network based on improved genetic algorithm
  79. Implementation of the Spark technique in a matrix distributed computing algorithm
  80. Construction of a financial default risk prediction model based on the LightGBM algorithm
  81. Application of embedded Linux in the design of Internet of Things gateway
  82. Research on computer static software defect detection system based on big data technology
  83. Study on data mining method of network security situation perception based on cloud computing
  84. Modeling and PID control of quadrotor UAV based on machine learning
  85. Simulation design of automobile automatic clutch based on mechatronics
  86. Research on the application of search algorithm in computer communication network
  87. Special Issue: Artificial Intelligence based Techniques and Applications for Intelligent IoT Systems
  88. Personalized recommendation system based on social tags in the era of Internet of Things
  89. Supervision method of indoor construction engineering quality acceptance based on cloud computing
  90. Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining
  91. Deep learning technology of Internet of Things Blockchain in distribution network faults
  92. Optimization of shared bike paths considering faulty vehicle recovery during dispatch
  93. The application of graphic language in animation visual guidance system under intelligent environment
  94. Iot-based power detection equipment management and control system
  95. Estimation and application of matrix eigenvalues based on deep neural network
  96. Brand image innovation design based on the era of 5G internet of things
  97. Special Issue: Cognitive Cyber-Physical System with Artificial Intelligence for Healthcare 4.0.
  98. Auxiliary diagnosis study of integrated electronic medical record text and CT images
  99. A hybrid particle swarm optimization with multi-objective clustering for dermatologic diseases diagnosis
  100. An efficient recurrent neural network with ensemble classifier-based weighted model for disease prediction
  101. Design of metaheuristic rough set-based feature selection and rule-based medical data classification model on MapReduce framework
Downloaded on 10.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/jisys-2021-0263/html
Scroll to top button