Table 1.
Literature review list.
Fig 1.
Pseudo-code of ABC algorithm.
Fig 2.
Artificial colony algorithm flow.
Fig 3.
Probability density distribution.
Fig 4.
Composite system framework.
Fig 5.
Artificial bee colony algorithm flow based on uniform mapping and collaborative acquisition control.
Fig 6.
5Parallel spectrum security allocation strategy.
Fig 7.
Three-dimensional function image for testing algorithm performance.
Table 2.
Results of ablation experiments using the proposed method in the study.
Fig 8.
Statistical square frequency of each system.
Table 3.
Information entropy and approximate entropy complexity of each system.
Fig 9.
Balanced mean curve.
Fig 10.
Convergence curves of three algorithms under different test functions.
Fig 11.
PR curves of three algorithms under different test functions.
Table 4.
Friedman test results of the model.
Table 5.
Griewank function, Bohachevsky function and Branin’s rcos function.
Fig 12.
Throughput comparison.
Fig 13.
Comparison of packet loss quantity.
Fig 14.
Spectrum utilization and percentage of eavesdropping on security services.