This paper is aimed to study the clustering method for Chinese medicine(CM) medical cases. The traditional K-means clustering algorithm had shortcomings such as dependence of results on the selection of initial valu...
详细信息
This paper is aimed to study the clustering method for Chinese medicine(CM) medical cases. The traditional K-means clustering algorithm had shortcomings such as dependence of results on the selection of initial value, trapping in local optimum when processing prescriptions form CM medical cases. Therefore, a new clustering method based on the collaboration of firefly algorithm and simulated annealing algorithm was proposed. This algorithm dynamically determined the iteration of firefly algorithm and simulates sampling of annealing algorithm by fitness changes, and increased the diversity of swarm through expansion of the scope of the sudden jump, thereby effectively avoiding premature problem. The results from confirmatory experiments for CM medical cases suggested that, comparing with traditional K-means clustering algorithms, this method was greatly improved in the individual diversity and the obtained clustering results, the computing results from this method had a certain reference value for cluster analysis on CM prescriptions.
Since the majority of the available steganographic schemes in OOXML format documents suffered the disadvantages of unsatisfactory anti-detection capability and security level, a characteristic-preserving steganographi...
详细信息
The internet of things (loT) attracts great interest in many application domains concerned with monitoring and :ontrol of physical phenomena. However, application devel- opment is still one of the main hurdles to a...
详细信息
The internet of things (loT) attracts great interest in many application domains concerned with monitoring and :ontrol of physical phenomena. However, application devel- opment is still one of the main hurdles to a wide adoption of IoT technology. Application development is done at a low level, very close to the operating system and requires pro- grammers to focus on low-level system issues. The under- lying APIs can be very complicated and the amount of data collected can be huge. This can be very hard to deal with as a developer. In this paper, we present a runtime model based approach to IoT application development. First, the manage- ability of sensor devices is abstracted as runtime models that are automatically connected with the corresponding systems. Second, a customized model is constructed according to a personalized application scenario and the synchronization be- tween the customized model and sensor device runtime mod- els is ensured through model transformation. Thus, all the application logic can be carried out by executing programs on the customized model. An experiment on a real-world ap- plication scenario demonstrates the feasibility, effectiveness, and benefits of the new approach to IoT application develop- ment.
Cluster analysis is important in scientific and industrial fields. In this study, we proposed a novel chaotic biogeography-based optimization(CBBO) method, and applied it in centroid-based clustering methods. The resu...
详细信息
Cluster analysis is important in scientific and industrial fields. In this study, we proposed a novel chaotic biogeography-based optimization(CBBO) method, and applied it in centroid-based clustering methods. The results over three types of simulation data showed that this proposed CBBO method gave better performance than chaotic particle swarm optimization, genetic algorithm, firefly algorithm, and quantum-behaved particle swarm optimization. In all, our CBBO method is effective in centroid-based clustering.
Recently, password based authenticated key exchange (or called PAKE for short) with chaotic maps has been received much attention for researchers. In 2013, Xie et al. proposed a three party PAKE scheme (based on chaot...
详细信息
Independent spanning trees(ISTs) have applications in interconnection networks such as reliable communication protocols, and secure message distribution, etc. In this paper, we use BIST to denote the IST isomorphic to...
详细信息
ISBN:
(纸本)9781467368513
Independent spanning trees(ISTs) have applications in interconnection networks such as reliable communication protocols, and secure message distribution, etc. In this paper, we use BIST to denote the IST isomorphic to binomial-like tree. We propose an algorithm to construct n BISTs and the algorithm can be parallelized on PQ n to run in O(N) time, where N = 2 n .
Longest Common Sub-sequence is a basic algorithm problem. It serves as a basic component for a variety of applications in informationprocessing and bioinformatics. It is a NP-hard problem and often manipulated using ...
详细信息
ISBN:
(纸本)9781509009800
Longest Common Sub-sequence is a basic algorithm problem. It serves as a basic component for a variety of applications in informationprocessing and bioinformatics. It is a NP-hard problem and often manipulated using dynamic programming, which is relatively fast but involves large memory space. Fortunately, cloud computing and outsourced computing provides a practical method for overload alleviation. However, for the security and privacy concern, clients hope to encrypt their data before upload them to the cloud, meanwhile maintain the ability for the cloud to process on the data. In this paper, we propose a method to computing Longest Common Sub-sequence using somewhat homomorphic encryption. Beyond that, we show how to use our achievement into searchable encryption to achieve rich expressiveness.
Transmembrane proteins play an important role in cellular energy production, signal transmission, metabolism. Existing machine learning methods are difficult to model the global correlation of the membrane protein seq...
详细信息
Automatic image annotation is a significant and challenging problem in pattern recognition and computer vision. Existing models did not describe the visual representations of corresponding keywords, which would lead t...
详细信息
Hadoop MapReduce has been proven an effective computing model to deal with big data for the last few years. However, one technical challenge facing this framework is how to predict the execution time of an individual ...
详细信息
暂无评论