Search alternatives:
greedy selection » gene selection (Expand Search), wheel selection (Expand Search)
code encryption » secure encryption (Expand Search)
Showing 1 - 6 results of 6 for search '(( greedy selection algorithm ) OR ( code encryption algorithm ))', query time: 0.06s Refine Results
  1. 1
  2. 2

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems by Bilal Khurshid (16715865)

    Published 2024
    “…To address the complexity of this NP-hard problem, the HES-IG algorithm combines evolution strategies (ES) and iterated greedy (IG) algorithm, as hybridizing algorithms helps different algorithms mitigate their weaknesses and leverage their respective strengths. …”
  3. 3

    Evacuation of a highly congested urban city by El Khoury, John

    Published 2017
    “…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 4

    A utility minimization approach for energy-aware cooperative content distribution with fairness constraints by Yaacoub, Elias

    Published 2012
    “…This leads to an unfair energy consumption for the selected MT. Thus, to ensure fairness in energy consumption, a low complexity utility minimization algorithm is proposed. …”
    Get full text
    Get full text
    Get full text
    article
  5. 5
  6. 6

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. …”