{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:53:13Z","timestamp":1776084793011,"version":"3.50.1"},"reference-count":20,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computational Methods in Sciences and Engineering"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>As the most valuable area in the telecommunications industry, wireless communication has shown great potential for development in the 21st century. With the massive popularity of smartphones and 5G technology, how to create a high-quality wireless communication transmission network gradually becomes a key problem that needs to be broken through urgently at present. The study proposes a corresponding greedy reinforcement learning algorithm based on the establishment of an interference-resistant wireless communication model, which performs direct retention of high-value actions as a way to avoid extensive network computation. The results show that the algorithm achieves a fitness value of 99.1 and converges to 99.9 at about 19 iterations in the handwritten digital image set. It indicates the algorithm has a fast convergence speed in incorporating the dual network structure and empirical recovery, which can effectively enhance the learning efficiency of the anti-interference of wireless communication system and provide a new reference method for the development of anti-interference technology of wireless communication.<\/jats:p>","DOI":"10.1177\/14727978251321743","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T20:10:07Z","timestamp":1741983007000},"page":"1002-1014","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["Anti-interference technology for wireless communication based on greedy reinforcement learning algorithm"],"prefix":"10.1177","volume":"25","author":[{"given":"Zailin","family":"Li","sequence":"first","affiliation":[{"name":"Xinxiang University"}]}],"member":"179","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2021.12.001"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2021.115443"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.06.001"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3626566"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3560261"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2019.1005"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2018.5950"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3125029"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2962915"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2021.02.001"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-022-06901-7"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3053088"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900551"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900207"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3034957"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2021.3064843"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2022CEI0002"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000005"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3436729"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10143-2"}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14727978251321743","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14727978251321743","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14727978251321743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:31:40Z","timestamp":1771000300000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14727978251321743"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1177\/14727978251321743"],"URL":"https:\/\/doi.org\/10.1177\/14727978251321743","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]}}}