Search alternatives:
encoding optimization » codon optimization (Expand Search), joint optimization (Expand Search), learning optimization (Expand Search)
a optimization » ai optimization (Expand Search), _ optimization (Expand Search), b optimization (Expand Search)
data encoding » data including (Expand Search), data according (Expand Search)
binary task » binary mask (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
task a » task _ (Expand Search), task 1 (Expand Search), task p (Expand Search)
encoding optimization » codon optimization (Expand Search), joint optimization (Expand Search), learning optimization (Expand Search)
a optimization » ai optimization (Expand Search), _ optimization (Expand Search), b optimization (Expand Search)
data encoding » data including (Expand Search), data according (Expand Search)
binary task » binary mask (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
task a » task _ (Expand Search), task 1 (Expand Search), task p (Expand Search)
-
1
-
2
Secure MANET routing with blockchain-enhanced latent encoder coupled GANs and BEPO optimization
Published 2025“…By integrating Latent Encoder Coupled Generative Adversarial Network (LEGAN) optimized with Binary Emperor Penguin optimizer (BEPO), the scheme enhances routing efficiency and security. …”
-
3
-
4
Proposed Algorithm.
Published 2025“…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …”
-
5
Comparisons between ADAM and NADAM optimizers.
Published 2025“…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …”
-
6
-
7
The Pseudo-Code of the IRBMO Algorithm.
Published 2025“…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
-
8
IRBMO vs. meta-heuristic algorithms boxplot.
Published 2025“…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
-
9
IRBMO vs. feature selection algorithm boxplot.
Published 2025“…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
-
10
An Example of a WPT-MEC Network.
Published 2025“…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …”
-
11
-
12
Related Work Summary.
Published 2025“…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …”
-
13
Simulation parameters.
Published 2025“…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …”
-
14
Training losses for N = 10.
Published 2025“…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …”
-
15
Normalized computation rate for N = 10.
Published 2025“…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …”
-
16
Summary of Notations Used in this paper.
Published 2025“…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …”
-
17
<i>hi</i>PRS algorithm process flow.
Published 2023“…<b>(C)</b> The whole training data is then scanned, searching for these sequences and deriving a re-encoded dataset where interaction terms are binary features (i.e., 1 if sequence <i>i</i> is observed in <i>j</i>-th patient genotype, 0 otherwise). …”
-
18
-
19
-
20
Predicting Thermal Decomposition Temperature of Binary Imidazolium Ionic Liquid Mixtures from Molecular Structures
Published 2021“…This study is devoted to develop a quantitative structure–property relationship model for predicting the <i>T</i><sub>d</sub>,<sub>5%onset</sub> of binary imidazolium IL mixtures. Both in silico design and data analysis descriptors and norm index were employed to encode the structural characteristics of binary IL mixtures. …”