Research Article
An Efficient Computing Offloading Scheme Based on Privacy-Preserving in Mobile Edge Computing Networks
Algorithm 2
Cross-overs based on similarity.
Input: cross-over probability ; similarity threshold . | Output: Individuals after crossing . | 1: for to do | 2: = Math. random | 3: ifthen | 4: | 5: | 6: end if | 7: end for | 8: fordo | 9: Calculate using (24) | 10: ifthen | 11: cross-over | 12: end if | 13: end for |
|