Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Table 1.

Literature review list.

More »

Table 1 Expand

Fig 1.

Pseudo-code of ABC algorithm.

More »

Fig 1 Expand

Fig 2.

Artificial colony algorithm flow.

More »

Fig 2 Expand

Fig 3.

Probability density distribution.

More »

Fig 3 Expand

Fig 4.

Composite system framework.

More »

Fig 4 Expand

Fig 5.

Artificial bee colony algorithm flow based on uniform mapping and collaborative acquisition control.

More »

Fig 5 Expand

Fig 6.

5Parallel spectrum security allocation strategy.

More »

Fig 6 Expand

Fig 7.

Three-dimensional function image for testing algorithm performance.

More »

Fig 7 Expand

Table 2.

Results of ablation experiments using the proposed method in the study.

More »

Table 2 Expand

Fig 8.

Statistical square frequency of each system.

More »

Fig 8 Expand

Table 3.

Information entropy and approximate entropy complexity of each system.

More »

Table 3 Expand

Fig 9.

Balanced mean curve.

More »

Fig 9 Expand

Fig 10.

Convergence curves of three algorithms under different test functions.

More »

Fig 10 Expand

Fig 11.

PR curves of three algorithms under different test functions.

More »

Fig 11 Expand

Table 4.

Friedman test results of the model.

More »

Table 4 Expand

Table 5.

Griewank function, Bohachevsky function and Branin’s rcos function.

More »

Table 5 Expand

Fig 12.

Throughput comparison.

More »

Fig 12 Expand

Fig 13.

Comparison of packet loss quantity.

More »

Fig 13 Expand

Fig 14.

Spectrum utilization and percentage of eavesdropping on security services.

More »

Fig 14 Expand