首页 > 最新文献

2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)最新文献

英文 中文
Edit distance based crossover operator in gene expression programming 编辑基因表达式编程中基于距离的交叉算子
Pub Date : 2015-10-01 DOI: 10.1109/BMEI.2015.7401550
Li Qu, Hongbing Cheng, Hai Lin
The population diversity greatly affects the evolutionary efficiency and solution quality of gene expression programming algorithm. Population diversity should be preserved by keeping certain distance between individuals in the population. Edit distance can describe the similarity of individuals well. Crossover is a way to create and maintain the distance of the individuals. In this paper, we propose two edit distance based crossover operators. Experimental results show that the proposed farthest edit distance based crossover operator is able to preserve the diversity of population and solve the optimization problem more efficiently.
种群多样性极大地影响了基因表达编程算法的进化效率和求解质量。种群中个体之间应保持一定距离,以保持种群多样性。编辑距离可以很好地描述个体的相似性。跨界是一种创造和保持个体距离的方式。本文提出了两种基于编辑距离的交叉算子。实验结果表明,所提出的基于最远编辑距离的交叉算子能够保持种群的多样性,更有效地解决优化问题。
{"title":"Edit distance based crossover operator in gene expression programming","authors":"Li Qu, Hongbing Cheng, Hai Lin","doi":"10.1109/BMEI.2015.7401550","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401550","url":null,"abstract":"The population diversity greatly affects the evolutionary efficiency and solution quality of gene expression programming algorithm. Population diversity should be preserved by keeping certain distance between individuals in the population. Edit distance can describe the similarity of individuals well. Crossover is a way to create and maintain the distance of the individuals. In this paper, we propose two edit distance based crossover operators. Experimental results show that the proposed farthest edit distance based crossover operator is able to preserve the diversity of population and solve the optimization problem more efficiently.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The value of 3.0T MR high-b-value DWIBS in detecting the cerebral metastases 3.0T MR高b值DWIBS对脑转移灶的检测价值
Pub Date : 2015-10-01 DOI: 10.1109/BMEI.2015.7401484
Y. Wang, Qin-yan Xu, Ye Zhang, Xi-zhen Wang, Xi-he Sun, Yue Guan, Yan-ming Ge, Guang-hui Chang
Comparing the imaging features on the ordinary fa-value and high-b-value DWIBS with that on the enhanced imaging, to explore the value of 3.0T MR high-b-value diffusion weighted imaging with background suppression (DWIBS) in detecting the cerebral metastases. 41 patients with cerebral metastases confirmed by clinically and pathologically were collected. All the patients underwent conventional MRI and contrast-enhanced MRI, and DWIBS used two types b-value: ordinary b-value (b=0, 1000s/mm2) and high-b-value (b=3000s/mm2). Evading cystic necrosis area, the signal intensity (SI), background noise and apparent diffusion coefficient (ADC) value of tumor parenchyma and adjacent normal white matter were measured. The averages of signal to noise ratio (SNR), contrast to noise ratio (CNR) and contrast ratio (CR) were computed from these data. The lesion diagnosis accuracy rate of high-b-value DWIBS was better than that of ordinary b-value. On high-b-value DWIBS sequence, the CNR, CR and SI-lesion/ SI-normal of brain metastasis was significant higher than that of ordinary b-value DWIBS sequence (P<;0.05). And the SNR was significant lower than that of ordinary b-value DWIBS sequence (P <; 0.05). The CNR, CR of Contrast-enhanced T1WI was significant higher than that of normal brain tissue (P<;0.05). The ADC value in High-b-value DWIBS sequence was lower than that in ordinary b-value DWIBS sequence (P <; 0.05). Conclusion High-b-value DWIBS sequence showed a great value in detecting cerebral metastases. It was a simple method and could be avoiding potential harm of contrast agent for the human bodies.
对比普通fa值、高b值DWIBS与增强成像的影像特征,探讨3.0T MR背景抑制高b值弥散加权成像(DWIBS)对脑转移灶的检测价值。收集经临床及病理证实的41例脑转移瘤患者。所有患者均行常规MRI和增强MRI检查,DWIBS采用普通b值(b= 0.1000 s/mm2)和高b值(b=3000s/mm2)两种b值类型。避开囊性坏死区,测量肿瘤实质及邻近正常白质的信号强度(SI)、背景噪声及表观扩散系数(ADC)值。根据这些数据计算信噪比(SNR)、噪声对比比(CNR)和对比度(CR)的平均值。高b值DWIBS病变诊断准确率优于普通b值DWIBS。高b值DWIBS序列脑转移灶的CNR、CR、si -病变/ si -正常值均显著高于普通b值DWIBS序列(P< 0.05)。信噪比显著低于普通b值DWIBS序列(P <;0.05)。T1WI增强脑组织的CNR、CR显著高于正常脑组织(P<;0.05)。高b值DWIBS序列的ADC值低于普通b值DWIBS序列(P <;0.05)。结论高b值DWIBS序列对脑转移瘤的检测具有重要价值。该方法简便,可避免造影剂对人体的潜在危害。
{"title":"The value of 3.0T MR high-b-value DWIBS in detecting the cerebral metastases","authors":"Y. Wang, Qin-yan Xu, Ye Zhang, Xi-zhen Wang, Xi-he Sun, Yue Guan, Yan-ming Ge, Guang-hui Chang","doi":"10.1109/BMEI.2015.7401484","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401484","url":null,"abstract":"Comparing the imaging features on the ordinary fa-value and high-b-value DWIBS with that on the enhanced imaging, to explore the value of 3.0T MR high-b-value diffusion weighted imaging with background suppression (DWIBS) in detecting the cerebral metastases. 41 patients with cerebral metastases confirmed by clinically and pathologically were collected. All the patients underwent conventional MRI and contrast-enhanced MRI, and DWIBS used two types b-value: ordinary b-value (b=0, 1000s/mm2) and high-b-value (b=3000s/mm2). Evading cystic necrosis area, the signal intensity (SI), background noise and apparent diffusion coefficient (ADC) value of tumor parenchyma and adjacent normal white matter were measured. The averages of signal to noise ratio (SNR), contrast to noise ratio (CNR) and contrast ratio (CR) were computed from these data. The lesion diagnosis accuracy rate of high-b-value DWIBS was better than that of ordinary b-value. On high-b-value DWIBS sequence, the CNR, CR and SI-lesion/ SI-normal of brain metastasis was significant higher than that of ordinary b-value DWIBS sequence (P<;0.05). And the SNR was significant lower than that of ordinary b-value DWIBS sequence (P <; 0.05). The CNR, CR of Contrast-enhanced T1WI was significant higher than that of normal brain tissue (P<;0.05). The ADC value in High-b-value DWIBS sequence was lower than that in ordinary b-value DWIBS sequence (P <; 0.05). Conclusion High-b-value DWIBS sequence showed a great value in detecting cerebral metastases. It was a simple method and could be avoiding potential harm of contrast agent for the human bodies.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127656638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust H∞ performance control of uncertain SDOSs 不确定sdss的鲁棒H∞性能控制
Pub Date : 2015-10-01 DOI: 10.1109/BMEI.2015.7401575
Wen Wang, Xin-zhuang Dong, T. Zhang
This paper investigates uncertain SDOSs (singular delta operator systems), regarding robust H∞ control and robust H∞ performance analysis. To ensure robust admissibility, we introduce the definition of generalized quadratic admissibility. Through LMI (linear matrix inequality), with the support of a necessary and sufficient condition, an uncertain singular delta operator system is generalized quadratically admissible with a prescribed performance. Then, based on these conclusions, the design problem of a robust H∞ controller is considered for uncertain SDOSs. In terms of an LMI, the existence condition of a suitable robust H∞ controller is derived, and the corresponding design method is also presented through the solution to the LMI. Also, a numerical example is adopted to show the efficiency of the theoretical results in this paper through Matlab-LMI toolbox.
本文研究了不确定奇异算子系统的鲁棒H∞控制和鲁棒H∞性能分析。为了保证鲁棒可容许性,引入了广义二次可容许性的定义。利用线性矩阵不等式,在一个充要条件的支持下,得到了一类具有规定性能的不确定奇异算子系统的广义二次可容许性。在此基础上,研究了不确定sdss的鲁棒H∞控制器设计问题。针对LMI,导出了合适的鲁棒H∞控制器的存在条件,并通过求解LMI给出了相应的设计方法。并通过Matlab-LMI工具箱给出了数值算例,验证了本文理论结果的有效性。
{"title":"Robust H∞ performance control of uncertain SDOSs","authors":"Wen Wang, Xin-zhuang Dong, T. Zhang","doi":"10.1109/BMEI.2015.7401575","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401575","url":null,"abstract":"This paper investigates uncertain SDOSs (singular delta operator systems), regarding robust H∞ control and robust H∞ performance analysis. To ensure robust admissibility, we introduce the definition of generalized quadratic admissibility. Through LMI (linear matrix inequality), with the support of a necessary and sufficient condition, an uncertain singular delta operator system is generalized quadratically admissible with a prescribed performance. Then, based on these conclusions, the design problem of a robust H∞ controller is considered for uncertain SDOSs. In terms of an LMI, the existence condition of a suitable robust H∞ controller is derived, and the corresponding design method is also presented through the solution to the LMI. Also, a numerical example is adopted to show the efficiency of the theoretical results in this paper through Matlab-LMI toolbox.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127440332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A resourse sharing approach for wireless access 一种用于无线接入的资源共享方法
Pub Date : 2015-10-01 DOI: 10.1109/BMEI.2015.7401605
Zhijiang Chang, Juan Guo, Hailin Zhang
In this paper we have considered a new resourse sharing approach for wireless access which is based on power assignment strategy, where two sources transmit their information simultaneously to the destination with the different power but use the same sub-band (time-frewquency unit). It discusses the concept of non-orthogonal multiple access (NOMA) which has a power multiplexing at the transmitter side to improve the spectrum efficiency and a successive interference cancellation (SIC) at the receiver side. Multi-antenna techniques have been deeply studied during the past decade to boost system performance by virtue of spatial multiplexing and/or spatial diversity. It is proved that NOMA combined with MIMO techniques can achieve further system performance improvement. In this paper, the SIC structure is designed, and the MMSE-SICand ZF-SIC algorithm is simulated and the effects of different order is anlysised. The conclusion is that the MMSE-SIC algorithm based on SINR ordering has lower complexity and better performance and is more suitable for NOMA.
本文提出了一种基于功率分配策略的无线接入资源共享新方法,即两个源以不同功率同时向目标发送信息,但使用同一子带(时频单位)。讨论了非正交多址(NOMA)的概念,即在发射端进行功率复用以提高频谱效率,在接收端进行连续干扰消除(SIC)。在过去的十年中,人们对多天线技术进行了深入的研究,通过空间复用和/或空间分集来提高系统性能。实验证明,NOMA结合MIMO技术可以进一步提高系统性能。本文设计了SIC结构,并对mmse -SIC和ZF-SIC算法进行了仿真,分析了不同阶数的影响。结果表明,基于SINR排序的MMSE-SIC算法具有较低的复杂度和较好的性能,更适合于NOMA。
{"title":"A resourse sharing approach for wireless access","authors":"Zhijiang Chang, Juan Guo, Hailin Zhang","doi":"10.1109/BMEI.2015.7401605","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401605","url":null,"abstract":"In this paper we have considered a new resourse sharing approach for wireless access which is based on power assignment strategy, where two sources transmit their information simultaneously to the destination with the different power but use the same sub-band (time-frewquency unit). It discusses the concept of non-orthogonal multiple access (NOMA) which has a power multiplexing at the transmitter side to improve the spectrum efficiency and a successive interference cancellation (SIC) at the receiver side. Multi-antenna techniques have been deeply studied during the past decade to boost system performance by virtue of spatial multiplexing and/or spatial diversity. It is proved that NOMA combined with MIMO techniques can achieve further system performance improvement. In this paper, the SIC structure is designed, and the MMSE-SICand ZF-SIC algorithm is simulated and the effects of different order is anlysised. The conclusion is that the MMSE-SIC algorithm based on SINR ordering has lower complexity and better performance and is more suitable for NOMA.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129171001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of the anesthesia machine monitoring system 麻醉机监控系统的设计与实现
Pub Date : 2015-10-01 DOI: 10.1109/BMEI.2015.7401615
Ming Huang, Zhenjuan Zhang
An intellectual non-invasive anesthesia machine monitoring system is analyzed in this paper. The system consists of a data acquisition terminal, a communication module and a PC/104 monitoring platform. The data acquisition terminal detects the real-time parameters including tidal flow, airway pressure and oxygen concentration. These parameters will be transmitted to the monitoring platform through serial ports for records and analysis. In this way, the flow, pressure and concentration of the medicine can be controlled for the general anesthesia on the patient. With advantages of intuitive alarm signals, safe and reliable environment, and complete function, the system also realizes the expert diagnosis by XMLHttpRequest and Server-Sent Events technology. After repeated validation test, the system can work steadily and will have a wide application prospect in the market.
介绍了一种智能无创麻醉机监控系统。该系统由数据采集终端、通信模块和PC/104监控平台组成。数据采集终端实时检测潮汐流量、气道压力、氧气浓度等参数。这些参数将通过串口传输到监控平台进行记录和分析。这样,在对病人进行全身麻醉时,就可以控制药物的流量、压力和浓度。该系统具有报警信号直观、环境安全可靠、功能完备等优点,并通过XMLHttpRequest和Server-Sent Events技术实现专家诊断。经过多次验证测试,该系统工作稳定,具有广阔的市场应用前景。
{"title":"Design and implementation of the anesthesia machine monitoring system","authors":"Ming Huang, Zhenjuan Zhang","doi":"10.1109/BMEI.2015.7401615","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401615","url":null,"abstract":"An intellectual non-invasive anesthesia machine monitoring system is analyzed in this paper. The system consists of a data acquisition terminal, a communication module and a PC/104 monitoring platform. The data acquisition terminal detects the real-time parameters including tidal flow, airway pressure and oxygen concentration. These parameters will be transmitted to the monitoring platform through serial ports for records and analysis. In this way, the flow, pressure and concentration of the medicine can be controlled for the general anesthesia on the patient. With advantages of intuitive alarm signals, safe and reliable environment, and complete function, the system also realizes the expert diagnosis by XMLHttpRequest and Server-Sent Events technology. After repeated validation test, the system can work steadily and will have a wide application prospect in the market.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132885997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A three-dimensional positioning system based on RSSI for the wireless sensor network 基于RSSI的无线传感器网络三维定位系统
Pub Date : 2015-10-01 DOI: 10.1109/BMEI.2015.7401606
Shan Liu, Fang Wang, Jianping Chai
With the popularity of smart phones and the rapid development of wireless communication technologies, people tend to determine their indoor location in the complex indoor environment such as a library, exhibition hall and shopping malls using location-based services. However, in many scenarios, two-dimensional positioning system has been unable to meet the needs. In this paper, we research on the three-dimensional positioning system using location fingerprinting techniques, improve the algorithm based on K Nearest Neighborhood, and establish the three-dimensional positioning system. The results showed that our simulation model can achieve a more accurate result than two-dimensional models.
随着智能手机的普及和无线通信技术的飞速发展,在图书馆、展览馆、商场等复杂的室内环境中,人们倾向于使用基于位置的服务来确定自己的室内位置。然而,在很多场景下,二维定位系统已经无法满足需求。本文对基于位置指纹技术的三维定位系统进行了研究,对基于K近邻的三维定位算法进行了改进,建立了三维定位系统。结果表明,与二维模型相比,我们的仿真模型可以获得更精确的结果。
{"title":"A three-dimensional positioning system based on RSSI for the wireless sensor network","authors":"Shan Liu, Fang Wang, Jianping Chai","doi":"10.1109/BMEI.2015.7401606","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401606","url":null,"abstract":"With the popularity of smart phones and the rapid development of wireless communication technologies, people tend to determine their indoor location in the complex indoor environment such as a library, exhibition hall and shopping malls using location-based services. However, in many scenarios, two-dimensional positioning system has been unable to meet the needs. In this paper, we research on the three-dimensional positioning system using location fingerprinting techniques, improve the algorithm based on K Nearest Neighborhood, and establish the three-dimensional positioning system. The results showed that our simulation model can achieve a more accurate result than two-dimensional models.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133530951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Preserving weighted social networks privacy using vectors similarity 基于向量相似性的加权社交网络隐私保护
Pub Date : 2015-10-01 DOI: 10.1109/BMEI.2015.7401610
Lihui Lan
Aiming at weighted social networks, a random perturbation method based on vectors similarity is proposed. It can protect structures and edge weights of weighted social networks in multiple release scenarios. First, it partitions weighted social networks into t sub-graphs by the segmentation method based on vertex cluster using edge space of graph theory, describes these sub-graphs by vectors, and constructs vector set models of weighted social networks. Then, it adopts weighted Euclidean distance as the metrics of vectors similarity to construct the released candidate sets of t sub-graphs according to the threshold designated by publishers. Finally, it randomly selects vectors from the candidate sets to construct the released vector set, and builds the published weighted social networks based on the released vector set. The proposed method can resist multiple vertex recognition attacks, force the attackers to re-identify in a large result set that the existential probabilities of the vectors are same, and increase the uncertainty of recognition. The experimental results on the actual datasets demonstrate that the proposed method can preserve the security of individuals' privacy, meanwhile it can protect some structure characteristics for social networks analysis and improve the released data utility.
针对加权社会网络,提出了一种基于向量相似性的随机摄动方法。它可以在多种发布场景下保护加权社交网络的结构和边缘权重。首先,利用图论的边缘空间,采用基于顶点聚类的分割方法将加权社交网络划分为t个子图,并对这些子图进行向量描述,构建加权社交网络的向量集模型;然后,采用加权欧氏距离作为向量相似度度量,根据发布者指定的阈值构建t个子图的发布候选集;最后,从候选集合中随机选取向量构建发布向量集,并基于发布向量集构建发布的加权社会网络。该方法可以抵抗多个顶点识别攻击,迫使攻击者在一个向量存在概率相同的大结果集中重新识别,增加了识别的不确定性。在实际数据集上的实验结果表明,该方法在保护个人隐私安全的同时,保护了社交网络分析的一些结构特征,提高了发布数据的实用性。
{"title":"Preserving weighted social networks privacy using vectors similarity","authors":"Lihui Lan","doi":"10.1109/BMEI.2015.7401610","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401610","url":null,"abstract":"Aiming at weighted social networks, a random perturbation method based on vectors similarity is proposed. It can protect structures and edge weights of weighted social networks in multiple release scenarios. First, it partitions weighted social networks into t sub-graphs by the segmentation method based on vertex cluster using edge space of graph theory, describes these sub-graphs by vectors, and constructs vector set models of weighted social networks. Then, it adopts weighted Euclidean distance as the metrics of vectors similarity to construct the released candidate sets of t sub-graphs according to the threshold designated by publishers. Finally, it randomly selects vectors from the candidate sets to construct the released vector set, and builds the published weighted social networks based on the released vector set. The proposed method can resist multiple vertex recognition attacks, force the attackers to re-identify in a large result set that the existential probabilities of the vectors are same, and increase the uncertainty of recognition. The experimental results on the actual datasets demonstrate that the proposed method can preserve the security of individuals' privacy, meanwhile it can protect some structure characteristics for social networks analysis and improve the released data utility.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133564468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient approach to detect and correct control-flow errors for linear assembly 线性装配控制流误差的有效检测和校正方法
Pub Date : 2015-10-01 DOI: 10.1109/BMEI.2015.7401567
Yuanqiang Qiu, QingPing Tan, Jianjun Xu, Yuxiang Zhao
In the space environment, a large number of cosmic rays often results in transient faults on on-board computers. And one of the main problems caused by these faults is the control flow errors in the program. This paper proposes a software-implemented control flow error detecting and correcting approach for the linear assembly named DCCLA. DCCLA firstly divides the program into loop blocks and non-loop blocks and assigns the formatted labels for the blocks. Then based on the mechanism of instructions counting, DCCLA inserts counting and comparing instructions into every block, with the purpose of detecting and correcting the control flow errors occurred inter-block and intra-block. In order to correct the data flow errors caused by the control flow errors, DCCLA backups the loop state and live variables. One advantage of DCCLA is that it can be configured flexibly according to the requirement of reliability and performance. The results of fault injection experiment shown that, the average fail rate of programs with DCCLA has decreased to 4.25% with the cost of increasing the average executing time by 41.7% and increasing the average program space by 46.7% DCCLA has the least influence on performance and space overhead and correspondingly higher reliability among three typical control flow detecting algorithms.
在空间环境中,大量的宇宙射线经常导致星载计算机发生瞬态故障。而这些故障造成的主要问题之一就是程序中的控制流错误。提出了一种基于软件实现的线性装配控制流误差检测与校正方法。dcla首先将程序划分为循环块和非循环块,并为这些块分配格式化的标签。然后基于指令计数机制,在每个块中插入计数和比较指令,以检测和纠正块间和块内发生的控制流错误。为了纠正由控制流错误引起的数据流错误,dcla备份了环路状态和活动变量。dcla的一个优点是可以根据可靠性和性能的要求进行灵活配置。故障注入实验结果表明,采用dcla的程序平均故障率降至4.25%,平均执行时间增加41.7%,平均程序空间增加46.7%,在三种典型的控制流检测算法中,dcla对性能和空间开销的影响最小,相应的可靠性更高。
{"title":"An efficient approach to detect and correct control-flow errors for linear assembly","authors":"Yuanqiang Qiu, QingPing Tan, Jianjun Xu, Yuxiang Zhao","doi":"10.1109/BMEI.2015.7401567","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401567","url":null,"abstract":"In the space environment, a large number of cosmic rays often results in transient faults on on-board computers. And one of the main problems caused by these faults is the control flow errors in the program. This paper proposes a software-implemented control flow error detecting and correcting approach for the linear assembly named DCCLA. DCCLA firstly divides the program into loop blocks and non-loop blocks and assigns the formatted labels for the blocks. Then based on the mechanism of instructions counting, DCCLA inserts counting and comparing instructions into every block, with the purpose of detecting and correcting the control flow errors occurred inter-block and intra-block. In order to correct the data flow errors caused by the control flow errors, DCCLA backups the loop state and live variables. One advantage of DCCLA is that it can be configured flexibly according to the requirement of reliability and performance. The results of fault injection experiment shown that, the average fail rate of programs with DCCLA has decreased to 4.25% with the cost of increasing the average executing time by 41.7% and increasing the average program space by 46.7% DCCLA has the least influence on performance and space overhead and correspondingly higher reliability among three typical control flow detecting algorithms.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116703338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-balanced clustering routing protocol based on task separation in wireless sensor networks 无线传感器网络中基于任务分离的能量均衡聚类路由协议
Pub Date : 2015-10-01 DOI: 10.1109/BMEI.2015.7401608
Wei Sun, Xiaoying Song, Fasheng Wang
Clustering protocol for data gathering is one of the effective ways to solve the energy hole problem in wireless sensor networks. However, most of the existing clustering protocols focus on the network model with uniform node distribution. They cannot effectively apply to the real network where the sensor nodes are randomly non-uniformly deployed. In this paper, we propose an energy-balanced clustering routing protocol (EBCRP) based on task separation. In this scheme, the network is firstly divided into clusters by using global information. And each of them has the same number of sensor nodes in order to balance the energy consumption of intra-cluster. In succession, task separation, the tasks of traditional single cluster head are separated and achieved by two cluster heads respectively, is proposed to reduce the traffic burden for single cluster head. Then, we explore an energy-efficient and reliable inter-cluster routing algorithm, which considers comprehensively three factors: residual energy, distance and available buffer space of nodes. Simulation results and performance evaluation of EBCRP show significant improvement in network lifetime and energy balance.
数据采集的聚类协议是解决无线传感器网络中能量空洞问题的有效方法之一。然而,现有的聚类协议大多侧重于节点均匀分布的网络模型。它们不能有效地应用于传感器节点随机非均匀分布的实际网络。本文提出了一种基于任务分离的能量均衡聚类路由协议(EBCRP)。该方案首先利用全局信息将网络划分为簇;为了平衡集群内的能量消耗,每个集群都有相同数量的传感器节点。接着,提出了任务分离,将传统的单簇头任务分别由两个簇头分离完成,以减轻单簇头的流量负担。在此基础上,综合考虑节点剩余能量、节点距离和节点可用缓冲空间三个因素,提出了一种高效可靠的集群间路由算法。仿真结果和性能评估表明,EBCRP在网络寿命和能量平衡方面有显著改善。
{"title":"Energy-balanced clustering routing protocol based on task separation in wireless sensor networks","authors":"Wei Sun, Xiaoying Song, Fasheng Wang","doi":"10.1109/BMEI.2015.7401608","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401608","url":null,"abstract":"Clustering protocol for data gathering is one of the effective ways to solve the energy hole problem in wireless sensor networks. However, most of the existing clustering protocols focus on the network model with uniform node distribution. They cannot effectively apply to the real network where the sensor nodes are randomly non-uniformly deployed. In this paper, we propose an energy-balanced clustering routing protocol (EBCRP) based on task separation. In this scheme, the network is firstly divided into clusters by using global information. And each of them has the same number of sensor nodes in order to balance the energy consumption of intra-cluster. In succession, task separation, the tasks of traditional single cluster head are separated and achieved by two cluster heads respectively, is proposed to reduce the traffic burden for single cluster head. Then, we explore an energy-efficient and reliable inter-cluster routing algorithm, which considers comprehensively three factors: residual energy, distance and available buffer space of nodes. Simulation results and performance evaluation of EBCRP show significant improvement in network lifetime and energy balance.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131961624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards a TCM domain ontology: Standardization, ontology engineering, and applications 面向TCM领域本体:标准化、本体工程和应用
Pub Date : 2015-10-01 DOI: 10.1109/BMEI.2015.7401556
Tong Yu, Meng Cui, Lirong Jia
Traditional Chinese Medicine (TCM) is a medical system with a long history, and is still in-practice today. The TCM domain has a plenty of archaic and abstruse terms and a complex conceptual system. In the information age, a lot of work has been done to digitalize TCM knowledge assets for information retrieval, knowledge discovery, and other applications. A domain ontology helps to standardize TCM terminology and can be very useful in TCM informatics. Therefore, we have engineered a domain ontology named Traditional Chinese Medicine Language System (TCMLS), which contains approximately 300,000 terms, 120,000 concepts, and 1,270,000 semantic relations. The semantic network framework of TCMLS was published as the ISO technical specification "ISO/TS 17938:2014" in 2014. TCMLS has been successfully applied in many applications such as knowledge visualization, terminology integration, and text mining.
中医是一种历史悠久的医学体系,至今仍在实践中。中医领域有大量古老而深奥的术语和复杂的概念体系。在信息时代,中医药知识资产数字化已成为信息检索、知识发现等应用领域的重要内容。领域本体有助于中医术语的规范化,在中医信息学中具有重要的应用价值。因此,我们设计了一个领域本体,命名为中医语言系统(Traditional Chinese Medicine Language System, TCMLS),它包含了大约30万个术语、12万个概念和127万个语义关系。TCMLS的语义网络框架于2014年作为ISO技术规范“ISO/TS 17938:2014”发布。TCMLS已成功地应用于知识可视化、术语集成和文本挖掘等领域。
{"title":"Towards a TCM domain ontology: Standardization, ontology engineering, and applications","authors":"Tong Yu, Meng Cui, Lirong Jia","doi":"10.1109/BMEI.2015.7401556","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401556","url":null,"abstract":"Traditional Chinese Medicine (TCM) is a medical system with a long history, and is still in-practice today. The TCM domain has a plenty of archaic and abstruse terms and a complex conceptual system. In the information age, a lot of work has been done to digitalize TCM knowledge assets for information retrieval, knowledge discovery, and other applications. A domain ontology helps to standardize TCM terminology and can be very useful in TCM informatics. Therefore, we have engineered a domain ontology named Traditional Chinese Medicine Language System (TCMLS), which contains approximately 300,000 terms, 120,000 concepts, and 1,270,000 semantic relations. The semantic network framework of TCMLS was published as the ISO technical specification \"ISO/TS 17938:2014\" in 2014. TCMLS has been successfully applied in many applications such as knowledge visualization, terminology integration, and text mining.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133372007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1