Research Article

An Efficient Computing Offloading Scheme Based on Privacy-Preserving in Mobile Edge Computing Networks

Algorithm 2

Cross-overs based on similarity.
Input: cross-over probability ; similarity threshold .
Output: Individuals after crossing .
1: for to do
2: = Math. random
3: ifthen
4:  
5:  
6: end if
7: end for
8: fordo
9: Calculate using (24)
10: ifthen
11:   cross-over
12: end if
13: end for