Search alternatives:
policy optimization » topology optimization (Expand Search), wolf optimization (Expand Search), process optimization (Expand Search)
based optimization » whale optimization (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
based policy » based policies (Expand Search)
binary 2 » binary _ (Expand Search), binary b (Expand Search)
2 based » _ based (Expand Search), 1 based (Expand Search), ai based (Expand Search)
policy optimization » topology optimization (Expand Search), wolf optimization (Expand Search), process optimization (Expand Search)
based optimization » whale optimization (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
based policy » based policies (Expand Search)
binary 2 » binary _ (Expand Search), binary b (Expand Search)
2 based » _ based (Expand Search), 1 based (Expand Search), ai based (Expand Search)
-
21
-
22
Proposed Algorithm.
Published 2025“…Hence, an Energy-Harvesting Reinforcement Learning-based Offloading Decision Algorithm (EHRL) is proposed. …”
-
23
-
24
-
25
-
26
-
27
-
28
-
29
-
30
-
31
-
32
-
33
-
34
-
35
-
36
-
37
-
38
-
39
Comparisons between ADAM and NADAM optimizers.
Published 2025“…Hence, an Energy-Harvesting Reinforcement Learning-based Offloading Decision Algorithm (EHRL) is proposed. …”
-
40
Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things
Published 2025“…Hence, Binary Black Widow Optimization Algorithm (BBWOA) is proposed in this manuscript to improve the BRBPNN classifier that detects intrusion precisely. …”