بدائل البحث:
network optimization » swarm optimization (توسيع البحث), wolf optimization (توسيع البحث)
a optimization » ai optimization (توسيع البحث), _ optimization (توسيع البحث), b optimization (توسيع البحث)
binary task » binary mask (توسيع البحث)
a network » _ network (توسيع البحث)
binary a » binary _ (توسيع البحث), binary b (توسيع البحث), hilary a (توسيع البحث)
task a » task _ (توسيع البحث), task 1 (توسيع البحث), task p (توسيع البحث)
network optimization » swarm optimization (توسيع البحث), wolf optimization (توسيع البحث)
a optimization » ai optimization (توسيع البحث), _ optimization (توسيع البحث), b optimization (توسيع البحث)
binary task » binary mask (توسيع البحث)
a network » _ network (توسيع البحث)
binary a » binary _ (توسيع البحث), binary b (توسيع البحث), hilary a (توسيع البحث)
task a » task _ (توسيع البحث), task 1 (توسيع البحث), task p (توسيع البحث)
-
1
Proposed Algorithm.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"
-
2
Comparisons between ADAM and NADAM optimizers.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"
-
3
An Example of a WPT-MEC Network.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"
-
4
-
5
MSE for ILSTM algorithm in binary classification.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
6
Related Work Summary.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"
-
7
Simulation parameters.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"
-
8
Training losses for N = 10.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"
-
9
Normalized computation rate for N = 10.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"
-
10
Summary of Notations Used in this paper.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"
-
11
-
12
-
13
Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things
منشور في 2025"…Hence, Binary Black Widow Optimization Algorithm (BBWOA) is proposed in this manuscript to improve the BRBPNN classifier that detects intrusion precisely. …"
-
14
A* Path-Finding Algorithm to Determine Cell Connections
منشور في 2025"…To address this, the research integrates a modified A* pathfinding algorithm with a U-Net convolutional neural network, a custom statistical binary classification method, and a personalized Min-Max connectivity threshold to automate the detection of astrocyte connectivity.…"
-
15
-
16
-
17
Secure MANET routing with blockchain-enhanced latent encoder coupled GANs and BEPO optimization
منشور في 2025"…The performance of the proposed LEGAN-BEPO-BCMANET technique attains 29.786%, 19.25%, 22.93%, 27.21%, 31.02%, 26.91%, and 25.61% greater throughput, compared to existing methods like Blockchain-based BATMAN protocol utilizing MANET with an ensemble algorithm (BATMAN-MANET), Block chain-based trusted distributed routing scheme with optimized dropout ensemble extreme learning neural network in MANET (DEELNN-MANET), A secured trusted routing utilizing structure of a new directed acyclic graph-blockchain in MANET internet of things environment (DAG-MANET), An Optimized Link State Routing Protocol with Blockchain Framework for Efficient Video-Packet Transmission and Security over MANET (OLSRP-MANET), Auto-metric Graph Neural Network based Blockchain Technology for Protected Dynamic Optimum Routing in MANET (AGNN-MANET) and Data security-based routing in MANETs under key management process (DSR-MANET) respectively.…"
-
18
The Pseudo-Code of the IRBMO Algorithm.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
-
19
IRBMO vs. meta-heuristic algorithms boxplot.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
-
20
IRBMO vs. feature selection algorithm boxplot.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"