Fig. 3From: A time-efficient data offloading method with privacy preservation for intelligent sensors in edge computingAn example of crossover operationBack to article page