Abstract
Anti-jamming cyclic frequency feature extraction is an important link in identifying communication interference signals, which is of great significance for eliminating electronic communication interference factors and improving the security of electronic communication environment. However, when the traditional feature extraction technology faces a large number of data samples, the processing capacity is low, and it cannot solve the multi-classification problems. For this type of problem, a method of electronic communication signal anti-jamming cyclic frequency feature extraction based on particle swarm optimization-support vector machines (PSO-SVM) algorithm is proposed. First, the SVM signal feature extraction model is proposed, and then the particle swarm optimization (PSO) algorithm is used. Optimize the kernel function parameter settings of SVM to raise the classifying quality of the SVM model. Finally, the function of the PSO-SVM signal feature extraction model is tested. The results verify that the PSO-SVM model begins to converge after 60 iterations, and the loss value remains at about 0.2, which is 0.2 lower than that of the SVM technique. The exactitude of signal feature extraction is 90.4%, and the recognition effect of binary phase shift keying signal is the best. The complete rate of signal feature extraction is 85%. This shows that the PSO-SVM model enhances the sensitivity of the anti-jamming cyclic frequency feature, improves the accuracy of the anti-jamming cyclic frequency feature recognition, reduces the running process, reduces the time cost, and greatly increases the performance of the SVM method. The good model performance also improves the application value of the method in the field of electronic communication.
1 Introduction
In the process of electronic communication, due to natural or artificial reasons, some electromagnetic energy enters the radio reception channel, resulting in the error and absence of receiving signals, or even the communication is blocked, that is, the electronic communication interference [1]. Electronic communication interference reduces the quality of signal reception; seriously affects the development of aviation navigation communication, railway train command, and broadcast communication; and brings inconvenience to people’s lives and travel, and it also poses a threat to the safety of people’s lives and property [2]. Therefore, extracting the signal anti-interference cycle frequency characteristics and identifying the electronic communication interference signals are particularly important. Support vector machine (SVM) is one of the important technologies. The SVM algorithm is a binary classification method that uses the internal product kernel function to realize the transformation of sample feature dimension, so as to reduce the complexity and difficulty of operation and improve the efficiency of sample classification [3,4]. Unlike other classification algorithms, the SVM algorithm uses a small amount of support vector to determine the classification effect, which reduces the classification error caused by redundant data and improves the robustness of the classification model [5]. However, the traditional SVM algorithm still has numerous practical limitations, such as difficulties in handling large numbers of data samples and the inability to solve multi-classification problems [6]. Therefore, in order to improve the cyclic frequency feature extraction effect of the electronic communication signal, the SVM signal feature extraction and recognition model optimized by the particle swarm algorithm (PSO) is proposed. By improving the model, we can process a large number of data samples and solve the problem of multiple classification, so as to provide a technical basis for improving the quality of the signal environment and realize the effective identification of electronic communication signals. The main contributions of this research are as follows: the research solves the problem of complex signal data that is difficult to deal with in the era of big data and provides an exploration idea for the field of big data processing. Section 2 briefly introduces the application of the SVM method in recent years and various studies in the field of electronic communication signals. Section 3 details the anti-interference cyclic frequency feature extraction method based on PSO-SVM and the feature extraction model constructed based on this method. In Section 4, the performance of the PSO-SVM algorithm proposed by the research is compared and the practical application effect of the proposed model is analyzed. In Section 5,the content of this study is analyzed and summarized.
2 Related work
SVM has been used in various fields of society as a binary linear classifier. Gu et al. [7] artificially optimized the detection effect of coconut water and proposed a brand discrimination method for coconut water by combining parallel factor analysis and SVM. Parallel factor analysis was used to process the data, and SVM was used to extract and classify the data features. The results demonstrate that the classification correctness of this method can reach 100%, which improves the application value of this method in the detection of coconut water. Wu et al. [8] expounded on the importance of tracking the pilot’s attention and proposed to capture the pilot’s pupil state using Haar wavelet transformation and SVM method to predict the pilot’s concentration force. The experiment revealed that this method can enhance the sensitivity to spherical signal features and raise the accuracy of pupil location recognition, which proves the effectiveness of the proposed method. Liao and Chen [9] suggested a radar recognition method based on k-nearest neighbor integrated with SVM-BP to improve the accuracy and efficiency of radar recognition. Compared with the traditional classification ways, the experimental data indicate that this method greatly reduces the redundant samples, optimizes the performance of the classification model, and provides a technical basis for high-precision radar recognition. Wang and Xu [10] introduced the principle of SVM, analyzed the advantages and limitations of SVM in the application of network intrusion detection, and proposed the optimization method using the improved whale algorithm. The analysis implies that the detection rate of the research method is 99.89%. Compared with the traditional approach, the operation efficiency of the proposed method is significantly improved, and the detection performance is better. To increase the effect of sports training, Wang and Qu [11] designed an artificial intelligence sports effect prediction model based on SVM and improved the prediction performance of SVM by optimizing the kernel function. The experimental data emphasize that this method promotes prediction accuracy and reduces running time, which promotes the development of intelligent sports. Veluchamy and Karlmarx [12] aimed to study biometric recognition and developed a K-SVM classification model to achieve accurate recognition of knuckles and palm prints. The study implied that this way reduces the recognition error, and the recognition accuracy can reach 0.95, which greatly improves the classification performance of the model and lays a foundation for expanding the application scope of biometric recognition [12].
Electronic communication integrates information technology and electronic science and technology, which plays an active role in promoting people’s level of life and driving social development. Sharma et al. [13] expounded on the necessity of cooperative communication technology and proposed a relay strategy based on time protocol to reduce the energy consumption of ethernet hosts relay by scaling system, so as to improve the efficiency of resource utilization and achieve green cooperation in wireless communication. Numerical simulation revealed that this way reduces energy consumption, which certificates the availability of this way. Mcrae et al. [14] introduced the application of radio communication in the field of search and rescue. Aiming at the limitations of communication equipment limited by terrain conditions, they developed a unmanned aerial vehicle relay system to complete the maintenance of radio communication during search and rescue. The simulation confirmed that the proposed method can realize successful communication recovery and enhance the stability of radio communication. Shehadeh et al. [15] artificially reduce the adverse effects of the environment on ultra high frequency and very high frequency bands to improve the quality of electronic communication signals and put forward three target algorithms, such as NSGA-II, to compare and analyze the advantages and disadvantages of several methods. The results verify that the NSGA-II method can reduce the loss of communication signals and improve the quality of radio communication signals. NSGA-II can be used as the optimal method for the layout of radio communication networks. Sezgin et al. [16] artificially expanded the application range of fiber radio and proposed a time-division duplex communication model to reduce the dependence of electronic communication effect on remote units by converting the received radio frequency into binary stream. The results attest that the error signal quality in this way is as low as −30 dB, which improves the shortcomings of optical fiber wireless communication. Dang and Peng [17] aimed to study virtual network technology. In order to improve the experience effect of the dashed line display, they designed a mobile virtual reality delivery model based on the F-RAN network to realize the storage and computing decisions of virtual reality video. The analysis indicates that this method increases the tolerance delay and promotes the spectrum efficiency, which proves the feasibility of the proposed method. Becvar et al. [18] summarized the outstanding advantages of radio frequency (RF) and visible light communication (VLC) in D2D communication. To evidence the mobility management level of D2D communication, they proposed a D2D communication customization algorithm to attest the throughput of electronic communication by judging the value of RF and VLC transformation. The study emphasizes that the said method is able to increase the throughput with fewer handovers.
According to the above research results, electronic communication technology has been extensively implemented in the field of human search and rescue and virtual networks, and plays a positive role in promoting social informatization and digitalization. The SVM algorithm is mostly used for data classification, which often needs to be combined with other optimization algorithms in practical applications to improve the application value of the SVM algorithm in various industries. In order to optimize the extraction effect of anti-interference cyclic frequency features of electronic communication signals, the PSO method is proposed to improve the sensitivity of SVM against interference signals and realize the effective recognition of electronic communication signals.
3 PSO-SVM-based electronic communication signal anti-jamming cyclic frequency feature extraction method
3.1 SVM signal feature extraction model
The SVM algorithm is a supervised learning algorithm. Its basic thought is to construct an optimal separation plane to correctly divide the data set. Specifically, it includes the use of the nonlinear mapping algorithm to realize the conversion of data from low-dimensional to high-dimensional, so as to solve the problem of sample non-linearity. When solving the problem of nonlinear characteristics of samples, it is necessary to find the best hyperplane to separate the sample data. The best hyperplane satisfies the following conditions: all samples are divided into two categories and distributed on both sides of the hyperplane, and the sample data on both sides to the distance of this plane is the maximum distance [19,20]. The core of the SVM is to determine the optimal hyperplane, which avoids the complex operation process, has the goodness of simple execution and low computational difficulty, and also helps to reduce the classification error caused by complex data, which has a positive effect on improving the classification accuracy [21]. Set the input signal as
where
where
where

Optimal classification plane.
In Figure 1, different types of sample data are distributed on both sides of the optimal hyperplane, and the hyperplanes are parallel to each other;
To solve the distance of the hyperplane, the Lagrangian function needs to be used, and its expression is shown in the following formula:
where
where the optimal solutions of
where
In equation (7),
where

Signal feature extraction model based on support vector machine.
From Figure 2, it can be observed that the core of the SVM signal feature extraction model is the kernel function. The kernel function is used to complete the internal product operation in the low-dimensional enclosure, so as to obtain the optimal solution for spatial classification effectively solving the low-dimensional space linear inseparability problem. The problems of increased dimension and increased calculation amount brought about by mapping are beneficial to improve the accuracy of signal anti-jamming cyclic frequency feature extraction.
3.2 PSO-optimized SVM signal feature extraction model
The PSO algorithm is a smart algorithm derived from bird flock foraging. It uses information sharing between particles in space to adjust the optimal solution search strategy to achieve an efficient and reliable search for optimal solutions. Compared with other intelligent algorithms, PSO has the characteristics of randomness and parallelism, which can broaden the search scope of the optimum solution, speed up the convergence velocity, and improve the operation efficiency. At the same time, the advantages of ease of implementation support it as an optimization algorithm [22]. The kernel function is the key to the SVM signal feature extraction model. The selection of the kernel function parameters directly affects the effect of the frequency extraction of the signal anti-jamming cycle. The PSO method is applied to determine the optimal kernel function parameters for the SVM model and reduce the signal anti-jamming cycle. The difficulty and complexity of frequency feature extraction are reduced, the running process is simplified, and the classification performance of the SVM model is improved while improving the running speed of the model [23]. The electronic communication signal data are sent into the PSO-SVM model, and it is standardized to remove noise and improve the standardization and unity of the electronic communication signal data. The radial basis kernel function is selected as the processing tool for signal data features, and its expression is shown in the following formula:
where
where
where
where
where
where

Influence factors of particle position and velocity.
Figure 3 shows the factors affecting the particle position and speed, which mainly include the present speed of the particle, the best place of the particle, and the best location of the particle group. The present speed of the particle reflects the adjustment effect of the inertia weight on the flying tempo of the particle; the embodiment of the historical best position adjusting its own flight plan reflects the cognitive part of the particle; the best tempo of the particle swarm reflects the cooperation ability between particles. It can be seen that the inertial part, the cognitive part, and the social part of the particle have an impact on the particle’s flying speed, and by adjusting the particle’s search ability, problems such as falling into local optimum and too slow search tempo are avoided.
In the process of searching for the best solution, the individual best value and the global perfect value are updated continuously iteratively until the set total amount of iterations is reached, and the optimal solution of the penalty factor
where

Structure of PSO-SVM signal feature extraction model.
Figure 4 shows that the PSO mainly performs the function of optimizing the kernel function. The global search advantage of PSO algorithm is utilized to determine the best parameters of the kernel function of the feature model of the SVM electronic communication signal, promote the improvement of the classification performance of the SVM model, and enhance the prediction ability of the SVM model for unknown communication signal data.
4 PSO-SVM electronic communication signal anti-jamming cycle frequency feature extraction model application
4.1 Performance analysis of the PSO-SVM algorithm
The Radio ML2016.04 C dataset and the Radio ML2016.10 A dataset are used for model training and testing and are represented by the A and B datasets, respectively, and 75% of the two datasets are randomly selected as the train set and 15% as the test suit and 10% as the validation set. The loss value, accuracy rate, and precision recall (PR) curve were used as model performance evaluation criteria, and three algorithm models, SVM algorithm, convolutional neural networks (CNN), and decision tree (DT) algorithm, were added as experimental comparisons. The experimental environment and data set-related information are shown in Table 1.
Experimental environment and data set related information
Parameter name | Parameter value | ||
---|---|---|---|
Experimental environment parameters | — | Operating system | Windows10 64 bit |
GPU | NVIDA Ge Force RTX 2070 SUPER | ||
CPU | Intel(R) Core(TM) i7-10700K CPU @ 3.80 GHz | ||
Memory capacity | 32GB | ||
Data set information | A data set | Number of samples | 8,500 |
Number of categories | 5 | ||
Communication signal category | BPSK, QPSK, CPFSK, GFSK, QAM64 | ||
B Data set | Number of samples | 7,789 | |
Number of categories | 5 | ||
Communication signal category | QAM16, 8PSK, 4PAM, WBFM, AM-DSB |
The experimental environment are as follows (Table 1): operating system Windows10 64 bit, the graphics card NVIDA Ge Force RTX 2070 SUPER, the processor Intel(R) Core(TM) i7-10700K CPU @ 3.80 GHz, and the memory capacity 32 GB; the number of samples in the A dataset is 8,500, and the number of communication signal categories is 5, including Binary Phase Shift Keying (BPSK), Quadra-ture Phase Shift Keying (QPSK), CPFSK, GFSK, and QAM64; the amount of samples in the B data set is 7,789, and the number of communication signal categories is 5, including QAM16, 8PSK, 4PAM, WBFM, and AM-DSB. The comparison of loss values under different algorithm models is shown in Figure 5.

Comparison of loss values under different algorithm models. (a) Loss value of A data set and (b) loss value of B data set.
In Figure 5, in dataset A, the PSO-SVM model tends to be stable after 70 iterations, and the loss value remains at 0.3, and the CNN model reaches a stable level with a loss value of 0.35 after 100 iterations. The convergence speed of the DT model is faster and tends to be stable after 90 iterations, but its loss value is the highest, reaching 0.8. In the data set B, after 60 iterations of the PSO-SVM model, the loss value remains stable at the level of 0.2. Compared with the SVM model, the number of iterations and the loss value are reduced by 50 times and 0.2, respectively, best performance with test results. The PSO-SVM model reduces the loss of the model, expedites the convergence speed of the model, and elevates the operating efficiency of the classification model. The accuracy comparison of distinct algorithm models is displayed in Figure 6.

Comparison of accuracy under different algorithm models. (a) PR curve of A data set and (b) PR curve of B data set.
Figure 6 shows that the recognition accuracy of each algorithm model expands with the increase in the signal-to-noise ratio. When the signal-to-noise ratio is in the range of [−5, 0], the accuracy of each algorithm model improves the fastest. The correctness of the PSO-SVM model in dataset A remains in the range of [65,92], and the accuracy in dataset B remains in the range of [70,93]. The highest accuracy of the SVM model in datasets A and B is 80 and 84%, respectively. The DT model performs poorly in the two datasets, and its highest accuracy is 17 and 12% lower than that of the PSO-SVM model, respectively. Therefore, the PSO-SVM model can accurately extract the anti-interference cyclic frequency characteristics of communication signals, improve the recognition accuracy of communication signals, and reduce the adverse effect of signal-to-noise ratio on feature extraction. The comparison of PR curves under different algorithm models is shown in Figure 7.

Comparison of PR curves under different algorithm models. (a) PR curve of A data set and (b) PR curve of B data set.
Figure 7 shows that the PSO-SVM model has the best training and testing results in the two datasets. In the training and testing of dataset A, under the same recall rate, the PSO-SVM technique and the SVM method, the maximum accuracy divergence between the DT model and the CNN model reached 0.18, 0.43, and 0.28, respectively; in the training and testing of dataset B, the maximum accuracy between the PSO-SVM model and the SVM model, the DT method and the CNN model reached 0.32, 0.25, and 0.2, respectively. The accuracy of the PSO-SVM model has always maintained the highest level under different recall rates. The PSO-SVM technique improves the probability of positive samples being correctly identified, enhances the accuracy and recall rate of the classification model, and optimizes the classification performance of the model.
4.2 Extraction result of electronic communication signal anti-jamming cyclic frequency feature
A radio station is selected as the model application object, and the electronic communication signals of the radio station are collected from October to November 2020, including four kinds of 250 electronic communication signals with cyclic frequency characteristics, which are quadrature phase shift keying QPSK, BPSK, minimum shift keying (MSK), and orthogonal quaternary phase shift keying (OQPSK) communication signal, the accuracy and integrity of feature extraction are used as evaluation indicators to judge the anti-interference cycle frequency extraction performance of the classification model for communication signals, and three algorithm models, SVM algorithm, CNN algorithm, and DT algorithm, are also added as the model application. The comparison of the accuracy of feature extraction of communication signals under different algorithm models is shown in Figure 8.

Comparison of feature extraction accuracy of communication signals under different algorithm models: (a) PSO-SVM model, (b) SVM model, (c) DT model, and (d) CNN model.
Figure 8 shows that compared with other algorithm models, the signal feature extraction correctness of the PSO-SVM technique is the highest. The extraction correctness of PSO-SVM technique for BPSK signal, QPSK signal, MSK signal, and OQPSK signal reached 96, 82, 84, and 90%, respectively, and the overall extraction accuracy reached 90.4%. The overall extraction accuracy of the SVM model is 84.8%, and the extraction accuracy of the four communication signals is 84, 72, 78, and 90%, respectively. The overall signal feature extraction accuracy of the DT model and CNN model is 81.6 and 87.2%, respectively. The PSO-SVM technique greatly improves the accuracy of anti-jamming cycle frequency feature extraction and significantly improves the model’s signal feature recognition effect. Figure 9 shows the complete rate of feature extraction of communication signals under different algorithm models.

Integrity rate of communication signal feature extraction under different algorithm models.
Figure 9 shows that the signal feature extraction integrity rate of the PSO-SVM technique is about 85%, which is 20% higher than that of the SVM technique. The signal feature extraction efficiency of the CNN model is good, with the signal feature extraction integrity rate reaching 72%. The DT model has the lowest feature extraction integrity rate, about 60%, which is 25% lower than the PSO-SVM method. The PSO-SVM model improves the integrity of the feature extraction of communication signals, and its effect is far superior to other algorithm models. It has significant advantages in signal feature extraction, which is conducive to ensuring the comprehensiveness and availability of communication signal features and laying a good foundation for communication signal classification.
5 Conclusion
Identifying communication interference signals is the basis for the development of radio technology and is of great significance to maintaining social stability and unity. In order to make up for the limitation of the SVM method in the feature extraction of anti-jamming cyclic frequency of communication signal, a PSO-SVM electronic communication signal interference cyclic frequency feature extraction model is proposed, and its application effect is verified. During training and testing, the PSO-SVM model tends to be stable after 60 iterations, the loss value maintains a stable level of 0.2, and the accuracy rates in the two datasets remain in the interval [65,92] and [70,93], the accuracy rate is the highest among the four models. In the application of the model, the signal feature extraction correctness of the PSO-SVM model reaches 90.4%, and the extraction exactitude of BPSK signal, QPSK signal, MSK signal, and OQPSK signal reaches 96, 82, 84, and 90%, respectively. At the same time, the complete rate of signal feature extraction is about 85%, which is 20% higher than that of the SVM method. From this, the PSO-SVM model improves the shortcomings of the SVM technique, such as the inability to handle large sample sizes, and achieves high-accuracy electronic signal recognition in a relatively short period of duration, which is conducive to improving the ability to collect the characteristics of the interference cycle frequency of electronic communication signals and promote the development of electronic communication engineering. Although the research has achieved certain results, there is still the limitation that the sample size is not large enough. In future research, it is essential to enlarge the specimen size, build a more complete PSO-SVM signal feature extraction model, and further improve the research results.
-
Author contributions: This manuscript was written by Xuemei Yang.
-
Conflict of interest: Author states no conflict of interest.
-
Data availability statement: The author confirmed that the data supporting the findings of this study are available within the article.
References
[1] Ferdouse L, Anpalagan A, Erkucuk S. Joint communication and computing resource allocation in 5G cloud radio access networks. IEEE Trans Vehicular Technol. 2019;68(9):9122–35.10.1109/TVT.2019.2927904Suche in Google Scholar
[2] Efremova EV, Dmitriev AS, Kuzmin LV. Measuring the distance between an emitter and a receiver in the wireless communication channel by ultrawideband chaotic radio pulses. Technical Phys Lett. 2019;45(9):853–7.10.1134/S1063785019090037Suche in Google Scholar
[3] Liu X, Cheng X, Lee K. GA-SVM based facial emotion recognition using facial geometric features. IEEE Sens J. 2021;21(10):11532–42.10.1109/JSEN.2020.3028075Suche in Google Scholar
[4] Maheswari KU, Rajesh S. A novel QIM-DCT based fusion approach for classification of remote sensing images via PSO and SVM models. Soft Comput. 2020;24(20):15561–76.10.1007/s00500-020-04884-xSuche in Google Scholar
[5] Hu H, He K, Zhong T, Hong Y. Fault diagnosis of FDM process based on support vector machine (SVM). Rapid Prototyp J. 2020;26(2):330–48.10.1108/RPJ-05-2019-0121Suche in Google Scholar
[6] Yu X, Liu J, Keung JW, Li Q, Cui X. Improving Ranking-Oriented Defect Prediction Using a Cost-Sensitive Ranking SVM. IEEE Trans Reliab. 2019;69(1):139–53.10.1109/TR.2019.2931559Suche in Google Scholar
[7] Gu H, Liu K, Huang X, Chen Q, Tan CP. Feasibility study for the analysis of coconut water using fluorescence spectroscopy coupled with PARAFAC and SVM methods. Br Food J. 2020;122(10):3203–12.10.1108/BFJ-12-2019-0941Suche in Google Scholar
[8] Wu EQ, Zhou GR, Zhu LM, Wei Ch-F, Ren H, Sheng RSF. Rotated sphere haar wavelet and deep contractive auto-encoder network with Fuzzy Gaussian SVM for pilot’s pupil center Detection. IEEE Trans Cybern. 2021;51(1):332–45.10.1109/TCYB.2018.2886012Suche in Google Scholar PubMed
[9] Liao Y, Chen X. Multi-attribute overlapping radar working pattern recognition based on K-NN and SVM-BP. J Supercomput. 2021;77(9):9642–57.10.1007/s11227-021-03660-4Suche in Google Scholar
[10] Wang D, Xu G. Research on the detection of network intrusion prevention with SVM based optimization algorithm. Informatica. 2020;44(2):269–73.10.31449/inf.v44i2.3195Suche in Google Scholar
[11] Wang J, Qu H. Analysis of regression prediction model of competitive sports based on SVM and artificial intelligence. J Intell Fuzzy Syst. 2020;39(4):5859–69.10.3233/JIFS-189061Suche in Google Scholar
[12] Veluchamy S, Karlmarx LR. HE-Co-HOG and k-SVM classifier for finger knuckle and palm print-based multimodal biometric recognition. Sens Rev. 2020;40(2):203–16.10.1108/SR-09-2017-0203Suche in Google Scholar
[13] Sharma R, Bitragunta S, Aparna M. Time switching based, outage-constrained, energy harvesting and energy-efficient cooperative radio communication policy. IET Commun. 2021;15(7):980–99.10.1049/cmu2.12136Suche in Google Scholar
[14] Mcrae JN, Nielsen BM, Gay CJ, Hunt AP, Nigh AD. Utilizing drones to restore and maintain radio communication during search and rescue operations. Wilderness Environ Med. 2021;32(1):41–6.10.1016/j.wem.2020.11.002Suche in Google Scholar PubMed
[15] Shehadeh HA, Idris M, Ahmedy I, Hassen HR. Optimal placement of near ground VHF/UHF radio communication network as a multi objective problem. Wirel Personal Commun. 2020;110(9):1169–97.10.1007/s11277-019-06780-6Suche in Google Scholar
[16] Sezgin IC, Aabel L, Jacobsson S, Durisi G, Fager C. All-digital, radio-over-fiber, communication link architecture for time-division duplex distributed antenna systems. J Lightwave Technol. 2021;39(9):2769–79.10.1109/JLT.2021.3057609Suche in Google Scholar
[17] Dang T, Peng M. Joint radio communication, caching and computing design for mobile virtual reality delivery in fog radio access networks. IEEE J Sel Areas Commun. 2019;37(7):1594–607.10.1109/JSAC.2019.2916486Suche in Google Scholar
[18] Becvar Z, Cheng RG, Charvat M, Mach P. Mobility management for D2D communication combining radio frequency and visible light communications bands. Wirel Netw. 2020;26(7):5473–84.10.1007/s11276-020-02408-xSuche in Google Scholar
[19] Ren L, Wang W. A Granular SVM-Based Method for Top-N Web Services Recommendation. IEEE Trans Serv Comput. 2019;15(1):457–69.10.1109/TSC.2019.2950291Suche in Google Scholar
[20] Roushangar K, Ghasempour R. Evaluation of the impact of channel geometry and rough elements arrangement in hydraulic jump energy dissipation via SVM. J Hydroinformatics. 2019;21(1–2):92–103.10.2166/hydro.2018.028Suche in Google Scholar
[21] Shukla AK, Singh P, Vardhan M. A new hybrid wrapper TLBO and SA with SVM approach for gene expression data. Inf Sci. 2019;503(3):238–54.10.1016/j.ins.2019.06.063Suche in Google Scholar
[22] Nabi S, Ahmed M. PSO-RDAL: particle swarm optimization-based resource- and deadline-aware dynamic load balancer for deadline constrained cloud tasks. The. J Supercomputing. 2022;78(4):4624–54.10.1007/s11227-021-04062-2Suche in Google Scholar
[23] Ge Q, Guo C, Jiang H, Lu Z, Hua Q. Industrial power load forecasting method based on reinforcement learning and PSO-LSSVM. IEEE Trans Cybern. 2020;52(2):1112–24.10.1109/TCYB.2020.2983871Suche in Google Scholar PubMed
© 2023 the author(s), published by De Gruyter
This work is licensed under the Creative Commons Attribution 4.0 International License.
Artikel in diesem Heft
- Research Articles
- Salp swarm and gray wolf optimizer for improving the efficiency of power supply network in radial distribution systems
- Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks
- On numerical characterizations of the topological reduction of incomplete information systems based on evidence theory
- A novel deep learning-based brain tumor detection using the Bagging ensemble with K-nearest neighbor
- Detecting biased user-product ratings for online products using opinion mining
- Evaluation and analysis of teaching quality of university teachers using machine learning algorithms
- Efficient mutual authentication using Kerberos for resource constraint smart meter in advanced metering infrastructure
- Recognition of English speech – using a deep learning algorithm
- A new method for writer identification based on historical documents
- Intelligent gloves: An IT intervention for deaf-mute people
- Reinforcement learning with Gaussian process regression using variational free energy
- Anti-leakage method of network sensitive information data based on homomorphic encryption
- An intelligent algorithm for fast machine translation of long English sentences
- A lattice-transformer-graph deep learning model for Chinese named entity recognition
- Robot indoor navigation point cloud map generation algorithm based on visual sensing
- Towards a better similarity algorithm for host-based intrusion detection system
- A multiorder feature tracking and explanation strategy for explainable deep learning
- Application study of ant colony algorithm for network data transmission path scheduling optimization
- Data analysis with performance and privacy enhanced classification
- Motion vector steganography algorithm of sports training video integrating with artificial bee colony algorithm and human-centered AI for web applications
- Multi-sensor remote sensing image alignment based on fast algorithms
- Replay attack detection based on deformable convolutional neural network and temporal-frequency attention model
- Validation of machine learning ridge regression models using Monte Carlo, bootstrap, and variations in cross-validation
- Computer technology of multisensor data fusion based on FWA–BP network
- Application of adaptive improved DE algorithm based on multi-angle search rotation crossover strategy in multi-circuit testing optimization
- HWCD: A hybrid approach for image compression using wavelet, encryption using confusion, and decryption using diffusion scheme
- Environmental landscape design and planning system based on computer vision and deep learning
- Wireless sensor node localization algorithm combined with PSO-DFP
- Development of a digital employee rating evaluation system (DERES) based on machine learning algorithms and 360-degree method
- A BiLSTM-attention-based point-of-interest recommendation algorithm
- Development and research of deep neural network fusion computer vision technology
- Face recognition of remote monitoring under the Ipv6 protocol technology of Internet of Things architecture
- Research on the center extraction algorithm of structured light fringe based on an improved gray gravity center method
- Anomaly detection for maritime navigation based on probability density function of error of reconstruction
- A novel hybrid CNN-LSTM approach for assessing StackOverflow post quality
- Integrating k-means clustering algorithm for the symbiotic relationship of aesthetic community spatial science
- Improved kernel density peaks clustering for plant image segmentation applications
- Biomedical event extraction using pre-trained SciBERT
- Sentiment analysis method of consumer comment text based on BERT and hierarchical attention in e-commerce big data environment
- An intelligent decision methodology for triangular Pythagorean fuzzy MADM and applications to college English teaching quality evaluation
- Ensemble of explainable artificial intelligence predictions through discriminate regions: A model to identify COVID-19 from chest X-ray images
- Image feature extraction algorithm based on visual information
- Optimizing genetic prediction: Define-by-run DL approach in DNA sequencing
- Study on recognition and classification of English accents using deep learning algorithms
- Review Articles
- Dimensions of artificial intelligence techniques, blockchain, and cyber security in the Internet of medical things: Opportunities, challenges, and future directions
- A systematic literature review of undiscovered vulnerabilities and tools in smart contract technology
- Special Issue: Trustworthy Artificial Intelligence for Big Data-Driven Research Applications based on Internet of Everythings
- Deep learning for content-based image retrieval in FHE algorithms
- Improving binary crow search algorithm for feature selection
- Enhancement of K-means clustering in big data based on equilibrium optimizer algorithm
- A study on predicting crime rates through machine learning and data mining using text
- Deep learning models for multilabel ECG abnormalities classification: A comparative study using TPE optimization
- Predicting medicine demand using deep learning techniques: A review
- A novel distance vector hop localization method for wireless sensor networks
- Development of an intelligent controller for sports training system based on FPGA
- Analyzing SQL payloads using logistic regression in a big data environment
- Classifying cuneiform symbols using machine learning algorithms with unigram features on a balanced dataset
- Waste material classification using performance evaluation of deep learning models
- A deep neural network model for paternity testing based on 15-loci STR for Iraqi families
- AttentionPose: Attention-driven end-to-end model for precise 6D pose estimation
- The impact of innovation and digitalization on the quality of higher education: A study of selected universities in Uzbekistan
- A transfer learning approach for the classification of liver cancer
- Review of iris segmentation and recognition using deep learning to improve biometric application
- Special Issue: Intelligent Robotics for Smart Cities
- Accurate and real-time object detection in crowded indoor spaces based on the fusion of DBSCAN algorithm and improved YOLOv4-tiny network
- CMOR motion planning and accuracy control for heavy-duty robots
- Smart robots’ virus defense using data mining technology
- Broadcast speech recognition and control system based on Internet of Things sensors for smart cities
- Special Issue on International Conference on Computing Communication & Informatics 2022
- Intelligent control system for industrial robots based on multi-source data fusion
- Construction pit deformation measurement technology based on neural network algorithm
- Intelligent financial decision support system based on big data
- Design model-free adaptive PID controller based on lazy learning algorithm
- Intelligent medical IoT health monitoring system based on VR and wearable devices
- Feature extraction algorithm of anti-jamming cyclic frequency of electronic communication signal
- Intelligent auditing techniques for enterprise finance
- Improvement of predictive control algorithm based on fuzzy fractional order PID
- Multilevel thresholding image segmentation algorithm based on Mumford–Shah model
- Special Issue: Current IoT Trends, Issues, and Future Potential Using AI & Machine Learning Techniques
- Automatic adaptive weighted fusion of features-based approach for plant disease identification
- A multi-crop disease identification approach based on residual attention learning
- Aspect-based sentiment analysis on multi-domain reviews through word embedding
- RES-KELM fusion model based on non-iterative deterministic learning classifier for classification of Covid19 chest X-ray images
- A review of small object and movement detection based loss function and optimized technique
Artikel in diesem Heft
- Research Articles
- Salp swarm and gray wolf optimizer for improving the efficiency of power supply network in radial distribution systems
- Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks
- On numerical characterizations of the topological reduction of incomplete information systems based on evidence theory
- A novel deep learning-based brain tumor detection using the Bagging ensemble with K-nearest neighbor
- Detecting biased user-product ratings for online products using opinion mining
- Evaluation and analysis of teaching quality of university teachers using machine learning algorithms
- Efficient mutual authentication using Kerberos for resource constraint smart meter in advanced metering infrastructure
- Recognition of English speech – using a deep learning algorithm
- A new method for writer identification based on historical documents
- Intelligent gloves: An IT intervention for deaf-mute people
- Reinforcement learning with Gaussian process regression using variational free energy
- Anti-leakage method of network sensitive information data based on homomorphic encryption
- An intelligent algorithm for fast machine translation of long English sentences
- A lattice-transformer-graph deep learning model for Chinese named entity recognition
- Robot indoor navigation point cloud map generation algorithm based on visual sensing
- Towards a better similarity algorithm for host-based intrusion detection system
- A multiorder feature tracking and explanation strategy for explainable deep learning
- Application study of ant colony algorithm for network data transmission path scheduling optimization
- Data analysis with performance and privacy enhanced classification
- Motion vector steganography algorithm of sports training video integrating with artificial bee colony algorithm and human-centered AI for web applications
- Multi-sensor remote sensing image alignment based on fast algorithms
- Replay attack detection based on deformable convolutional neural network and temporal-frequency attention model
- Validation of machine learning ridge regression models using Monte Carlo, bootstrap, and variations in cross-validation
- Computer technology of multisensor data fusion based on FWA–BP network
- Application of adaptive improved DE algorithm based on multi-angle search rotation crossover strategy in multi-circuit testing optimization
- HWCD: A hybrid approach for image compression using wavelet, encryption using confusion, and decryption using diffusion scheme
- Environmental landscape design and planning system based on computer vision and deep learning
- Wireless sensor node localization algorithm combined with PSO-DFP
- Development of a digital employee rating evaluation system (DERES) based on machine learning algorithms and 360-degree method
- A BiLSTM-attention-based point-of-interest recommendation algorithm
- Development and research of deep neural network fusion computer vision technology
- Face recognition of remote monitoring under the Ipv6 protocol technology of Internet of Things architecture
- Research on the center extraction algorithm of structured light fringe based on an improved gray gravity center method
- Anomaly detection for maritime navigation based on probability density function of error of reconstruction
- A novel hybrid CNN-LSTM approach for assessing StackOverflow post quality
- Integrating k-means clustering algorithm for the symbiotic relationship of aesthetic community spatial science
- Improved kernel density peaks clustering for plant image segmentation applications
- Biomedical event extraction using pre-trained SciBERT
- Sentiment analysis method of consumer comment text based on BERT and hierarchical attention in e-commerce big data environment
- An intelligent decision methodology for triangular Pythagorean fuzzy MADM and applications to college English teaching quality evaluation
- Ensemble of explainable artificial intelligence predictions through discriminate regions: A model to identify COVID-19 from chest X-ray images
- Image feature extraction algorithm based on visual information
- Optimizing genetic prediction: Define-by-run DL approach in DNA sequencing
- Study on recognition and classification of English accents using deep learning algorithms
- Review Articles
- Dimensions of artificial intelligence techniques, blockchain, and cyber security in the Internet of medical things: Opportunities, challenges, and future directions
- A systematic literature review of undiscovered vulnerabilities and tools in smart contract technology
- Special Issue: Trustworthy Artificial Intelligence for Big Data-Driven Research Applications based on Internet of Everythings
- Deep learning for content-based image retrieval in FHE algorithms
- Improving binary crow search algorithm for feature selection
- Enhancement of K-means clustering in big data based on equilibrium optimizer algorithm
- A study on predicting crime rates through machine learning and data mining using text
- Deep learning models for multilabel ECG abnormalities classification: A comparative study using TPE optimization
- Predicting medicine demand using deep learning techniques: A review
- A novel distance vector hop localization method for wireless sensor networks
- Development of an intelligent controller for sports training system based on FPGA
- Analyzing SQL payloads using logistic regression in a big data environment
- Classifying cuneiform symbols using machine learning algorithms with unigram features on a balanced dataset
- Waste material classification using performance evaluation of deep learning models
- A deep neural network model for paternity testing based on 15-loci STR for Iraqi families
- AttentionPose: Attention-driven end-to-end model for precise 6D pose estimation
- The impact of innovation and digitalization on the quality of higher education: A study of selected universities in Uzbekistan
- A transfer learning approach for the classification of liver cancer
- Review of iris segmentation and recognition using deep learning to improve biometric application
- Special Issue: Intelligent Robotics for Smart Cities
- Accurate and real-time object detection in crowded indoor spaces based on the fusion of DBSCAN algorithm and improved YOLOv4-tiny network
- CMOR motion planning and accuracy control for heavy-duty robots
- Smart robots’ virus defense using data mining technology
- Broadcast speech recognition and control system based on Internet of Things sensors for smart cities
- Special Issue on International Conference on Computing Communication & Informatics 2022
- Intelligent control system for industrial robots based on multi-source data fusion
- Construction pit deformation measurement technology based on neural network algorithm
- Intelligent financial decision support system based on big data
- Design model-free adaptive PID controller based on lazy learning algorithm
- Intelligent medical IoT health monitoring system based on VR and wearable devices
- Feature extraction algorithm of anti-jamming cyclic frequency of electronic communication signal
- Intelligent auditing techniques for enterprise finance
- Improvement of predictive control algorithm based on fuzzy fractional order PID
- Multilevel thresholding image segmentation algorithm based on Mumford–Shah model
- Special Issue: Current IoT Trends, Issues, and Future Potential Using AI & Machine Learning Techniques
- Automatic adaptive weighted fusion of features-based approach for plant disease identification
- A multi-crop disease identification approach based on residual attention learning
- Aspect-based sentiment analysis on multi-domain reviews through word embedding
- RES-KELM fusion model based on non-iterative deterministic learning classifier for classification of Covid19 chest X-ray images
- A review of small object and movement detection based loss function and optimized technique