Search alternatives:
policy optimization » topology optimization (Expand Search), wolf optimization (Expand Search), process optimization (Expand Search)
robust optimization » process optimization (Expand Search), robust estimation (Expand Search), joint optimization (Expand Search)
binary edge » binary image (Expand Search)
edge policy » sdgs policy (Expand Search), media policy (Expand Search), leave policy (Expand Search)
policy optimization » topology optimization (Expand Search), wolf optimization (Expand Search), process optimization (Expand Search)
robust optimization » process optimization (Expand Search), robust estimation (Expand Search), joint optimization (Expand Search)
binary edge » binary image (Expand Search)
edge policy » sdgs policy (Expand Search), media policy (Expand Search), leave policy (Expand Search)
-
1
-
2
-
3
Comparisons of computation rate performance for different offloading algorithms.for N = 10, 20, 30.
Published 2025Subjects: -
4
Comparison of total time consumed for different offloading algorithms.for N = 10, 20, 30.
Published 2025Subjects: -
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
The evolution of the Wireless Power Transfer (WPT) time fraction β over simulation frames.
Published 2025Subjects: -
14
-
15
CDF of task latency, approximated as the inverse of the achieved computation rate.
Published 2025Subjects: -
16
-
17
-
18
-
19
Secure MANET routing with blockchain-enhanced latent encoder coupled GANs and BEPO optimization
Published 2025“…By integrating Latent Encoder Coupled Generative Adversarial Network (LEGAN) optimized with Binary Emperor Penguin optimizer (BEPO), the scheme enhances routing efficiency and security. …”
-
20
The Pseudo-Code of the IRBMO Algorithm.
Published 2025“…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …”