Showing 1 - 20 results of 203 for search '(( binary task design optimization algorithm ) OR ( binary a based optimization algorithm ))', query time: 0.44s Refine Results
  1. 1

    Proposed Algorithm. by Hend Bayoumi (22693738)

    Published 2025
    “…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …”
  2. 2

    Comparisons between ADAM and NADAM optimizers. by Hend Bayoumi (22693738)

    Published 2025
    “…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …”
  3. 3

    The Pseudo-Code of the IRBMO Algorithm. by Chenyi Zhu (9383370)

    Published 2025
    “…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
  4. 4

    IRBMO vs. meta-heuristic algorithms boxplot. by Chenyi Zhu (9383370)

    Published 2025
    “…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
  5. 5

    IRBMO vs. feature selection algorithm boxplot. by Chenyi Zhu (9383370)

    Published 2025
    “…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    An Example of a WPT-MEC Network. by Hend Bayoumi (22693738)

    Published 2025
    “…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …”
  13. 13
  14. 14

    MSE for ILSTM algorithm in binary classification. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  15. 15

    Related Work Summary. by Hend Bayoumi (22693738)

    Published 2025
    “…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …”
  16. 16

    Simulation parameters. by Hend Bayoumi (22693738)

    Published 2025
    “…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …”
  17. 17

    Training losses for N = 10. by Hend Bayoumi (22693738)

    Published 2025
    “…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …”
  18. 18

    Normalized computation rate for N = 10. by Hend Bayoumi (22693738)

    Published 2025
    “…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …”
  19. 19

    Summary of Notations Used in this paper. by Hend Bayoumi (22693738)

    Published 2025
    “…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …”
  20. 20