Pub Date : 2015-10-01DOI: 10.1109/BMEI.2015.7401550
Li Qu, Hongbing Cheng, Hai Lin
The population diversity greatly affects the evolutionary efficiency and solution quality of gene expression programming algorithm. Population diversity should be preserved by keeping certain distance between individuals in the population. Edit distance can describe the similarity of individuals well. Crossover is a way to create and maintain the distance of the individuals. In this paper, we propose two edit distance based crossover operators. Experimental results show that the proposed farthest edit distance based crossover operator is able to preserve the diversity of population and solve the optimization problem more efficiently.
{"title":"Edit distance based crossover operator in gene expression programming","authors":"Li Qu, Hongbing Cheng, Hai Lin","doi":"10.1109/BMEI.2015.7401550","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401550","url":null,"abstract":"The population diversity greatly affects the evolutionary efficiency and solution quality of gene expression programming algorithm. Population diversity should be preserved by keeping certain distance between individuals in the population. Edit distance can describe the similarity of individuals well. Crossover is a way to create and maintain the distance of the individuals. In this paper, we propose two edit distance based crossover operators. Experimental results show that the proposed farthest edit distance based crossover operator is able to preserve the diversity of population and solve the optimization problem more efficiently.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/BMEI.2015.7401484
Y. Wang, Qin-yan Xu, Ye Zhang, Xi-zhen Wang, Xi-he Sun, Yue Guan, Yan-ming Ge, Guang-hui Chang
Comparing the imaging features on the ordinary fa-value and high-b-value DWIBS with that on the enhanced imaging, to explore the value of 3.0T MR high-b-value diffusion weighted imaging with background suppression (DWIBS) in detecting the cerebral metastases. 41 patients with cerebral metastases confirmed by clinically and pathologically were collected. All the patients underwent conventional MRI and contrast-enhanced MRI, and DWIBS used two types b-value: ordinary b-value (b=0, 1000s/mm2) and high-b-value (b=3000s/mm2). Evading cystic necrosis area, the signal intensity (SI), background noise and apparent diffusion coefficient (ADC) value of tumor parenchyma and adjacent normal white matter were measured. The averages of signal to noise ratio (SNR), contrast to noise ratio (CNR) and contrast ratio (CR) were computed from these data. The lesion diagnosis accuracy rate of high-b-value DWIBS was better than that of ordinary b-value. On high-b-value DWIBS sequence, the CNR, CR and SI-lesion/ SI-normal of brain metastasis was significant higher than that of ordinary b-value DWIBS sequence (P<;0.05). And the SNR was significant lower than that of ordinary b-value DWIBS sequence (P <; 0.05). The CNR, CR of Contrast-enhanced T1WI was significant higher than that of normal brain tissue (P<;0.05). The ADC value in High-b-value DWIBS sequence was lower than that in ordinary b-value DWIBS sequence (P <; 0.05). Conclusion High-b-value DWIBS sequence showed a great value in detecting cerebral metastases. It was a simple method and could be avoiding potential harm of contrast agent for the human bodies.
对比普通fa值、高b值DWIBS与增强成像的影像特征,探讨3.0T MR背景抑制高b值弥散加权成像(DWIBS)对脑转移灶的检测价值。收集经临床及病理证实的41例脑转移瘤患者。所有患者均行常规MRI和增强MRI检查,DWIBS采用普通b值(b= 0.1000 s/mm2)和高b值(b=3000s/mm2)两种b值类型。避开囊性坏死区,测量肿瘤实质及邻近正常白质的信号强度(SI)、背景噪声及表观扩散系数(ADC)值。根据这些数据计算信噪比(SNR)、噪声对比比(CNR)和对比度(CR)的平均值。高b值DWIBS病变诊断准确率优于普通b值DWIBS。高b值DWIBS序列脑转移灶的CNR、CR、si -病变/ si -正常值均显著高于普通b值DWIBS序列(P< 0.05)。信噪比显著低于普通b值DWIBS序列(P <;0.05)。T1WI增强脑组织的CNR、CR显著高于正常脑组织(P<;0.05)。高b值DWIBS序列的ADC值低于普通b值DWIBS序列(P <;0.05)。结论高b值DWIBS序列对脑转移瘤的检测具有重要价值。该方法简便,可避免造影剂对人体的潜在危害。
{"title":"The value of 3.0T MR high-b-value DWIBS in detecting the cerebral metastases","authors":"Y. Wang, Qin-yan Xu, Ye Zhang, Xi-zhen Wang, Xi-he Sun, Yue Guan, Yan-ming Ge, Guang-hui Chang","doi":"10.1109/BMEI.2015.7401484","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401484","url":null,"abstract":"Comparing the imaging features on the ordinary fa-value and high-b-value DWIBS with that on the enhanced imaging, to explore the value of 3.0T MR high-b-value diffusion weighted imaging with background suppression (DWIBS) in detecting the cerebral metastases. 41 patients with cerebral metastases confirmed by clinically and pathologically were collected. All the patients underwent conventional MRI and contrast-enhanced MRI, and DWIBS used two types b-value: ordinary b-value (b=0, 1000s/mm2) and high-b-value (b=3000s/mm2). Evading cystic necrosis area, the signal intensity (SI), background noise and apparent diffusion coefficient (ADC) value of tumor parenchyma and adjacent normal white matter were measured. The averages of signal to noise ratio (SNR), contrast to noise ratio (CNR) and contrast ratio (CR) were computed from these data. The lesion diagnosis accuracy rate of high-b-value DWIBS was better than that of ordinary b-value. On high-b-value DWIBS sequence, the CNR, CR and SI-lesion/ SI-normal of brain metastasis was significant higher than that of ordinary b-value DWIBS sequence (P<;0.05). And the SNR was significant lower than that of ordinary b-value DWIBS sequence (P <; 0.05). The CNR, CR of Contrast-enhanced T1WI was significant higher than that of normal brain tissue (P<;0.05). The ADC value in High-b-value DWIBS sequence was lower than that in ordinary b-value DWIBS sequence (P <; 0.05). Conclusion High-b-value DWIBS sequence showed a great value in detecting cerebral metastases. It was a simple method and could be avoiding potential harm of contrast agent for the human bodies.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127656638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/BMEI.2015.7401575
Wen Wang, Xin-zhuang Dong, T. Zhang
This paper investigates uncertain SDOSs (singular delta operator systems), regarding robust H∞ control and robust H∞ performance analysis. To ensure robust admissibility, we introduce the definition of generalized quadratic admissibility. Through LMI (linear matrix inequality), with the support of a necessary and sufficient condition, an uncertain singular delta operator system is generalized quadratically admissible with a prescribed performance. Then, based on these conclusions, the design problem of a robust H∞ controller is considered for uncertain SDOSs. In terms of an LMI, the existence condition of a suitable robust H∞ controller is derived, and the corresponding design method is also presented through the solution to the LMI. Also, a numerical example is adopted to show the efficiency of the theoretical results in this paper through Matlab-LMI toolbox.
{"title":"Robust H∞ performance control of uncertain SDOSs","authors":"Wen Wang, Xin-zhuang Dong, T. Zhang","doi":"10.1109/BMEI.2015.7401575","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401575","url":null,"abstract":"This paper investigates uncertain SDOSs (singular delta operator systems), regarding robust H∞ control and robust H∞ performance analysis. To ensure robust admissibility, we introduce the definition of generalized quadratic admissibility. Through LMI (linear matrix inequality), with the support of a necessary and sufficient condition, an uncertain singular delta operator system is generalized quadratically admissible with a prescribed performance. Then, based on these conclusions, the design problem of a robust H∞ controller is considered for uncertain SDOSs. In terms of an LMI, the existence condition of a suitable robust H∞ controller is derived, and the corresponding design method is also presented through the solution to the LMI. Also, a numerical example is adopted to show the efficiency of the theoretical results in this paper through Matlab-LMI toolbox.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127440332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/BMEI.2015.7401605
Zhijiang Chang, Juan Guo, Hailin Zhang
In this paper we have considered a new resourse sharing approach for wireless access which is based on power assignment strategy, where two sources transmit their information simultaneously to the destination with the different power but use the same sub-band (time-frewquency unit). It discusses the concept of non-orthogonal multiple access (NOMA) which has a power multiplexing at the transmitter side to improve the spectrum efficiency and a successive interference cancellation (SIC) at the receiver side. Multi-antenna techniques have been deeply studied during the past decade to boost system performance by virtue of spatial multiplexing and/or spatial diversity. It is proved that NOMA combined with MIMO techniques can achieve further system performance improvement. In this paper, the SIC structure is designed, and the MMSE-SICand ZF-SIC algorithm is simulated and the effects of different order is anlysised. The conclusion is that the MMSE-SIC algorithm based on SINR ordering has lower complexity and better performance and is more suitable for NOMA.
{"title":"A resourse sharing approach for wireless access","authors":"Zhijiang Chang, Juan Guo, Hailin Zhang","doi":"10.1109/BMEI.2015.7401605","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401605","url":null,"abstract":"In this paper we have considered a new resourse sharing approach for wireless access which is based on power assignment strategy, where two sources transmit their information simultaneously to the destination with the different power but use the same sub-band (time-frewquency unit). It discusses the concept of non-orthogonal multiple access (NOMA) which has a power multiplexing at the transmitter side to improve the spectrum efficiency and a successive interference cancellation (SIC) at the receiver side. Multi-antenna techniques have been deeply studied during the past decade to boost system performance by virtue of spatial multiplexing and/or spatial diversity. It is proved that NOMA combined with MIMO techniques can achieve further system performance improvement. In this paper, the SIC structure is designed, and the MMSE-SICand ZF-SIC algorithm is simulated and the effects of different order is anlysised. The conclusion is that the MMSE-SIC algorithm based on SINR ordering has lower complexity and better performance and is more suitable for NOMA.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129171001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/BMEI.2015.7401615
Ming Huang, Zhenjuan Zhang
An intellectual non-invasive anesthesia machine monitoring system is analyzed in this paper. The system consists of a data acquisition terminal, a communication module and a PC/104 monitoring platform. The data acquisition terminal detects the real-time parameters including tidal flow, airway pressure and oxygen concentration. These parameters will be transmitted to the monitoring platform through serial ports for records and analysis. In this way, the flow, pressure and concentration of the medicine can be controlled for the general anesthesia on the patient. With advantages of intuitive alarm signals, safe and reliable environment, and complete function, the system also realizes the expert diagnosis by XMLHttpRequest and Server-Sent Events technology. After repeated validation test, the system can work steadily and will have a wide application prospect in the market.
{"title":"Design and implementation of the anesthesia machine monitoring system","authors":"Ming Huang, Zhenjuan Zhang","doi":"10.1109/BMEI.2015.7401615","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401615","url":null,"abstract":"An intellectual non-invasive anesthesia machine monitoring system is analyzed in this paper. The system consists of a data acquisition terminal, a communication module and a PC/104 monitoring platform. The data acquisition terminal detects the real-time parameters including tidal flow, airway pressure and oxygen concentration. These parameters will be transmitted to the monitoring platform through serial ports for records and analysis. In this way, the flow, pressure and concentration of the medicine can be controlled for the general anesthesia on the patient. With advantages of intuitive alarm signals, safe and reliable environment, and complete function, the system also realizes the expert diagnosis by XMLHttpRequest and Server-Sent Events technology. After repeated validation test, the system can work steadily and will have a wide application prospect in the market.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132885997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/BMEI.2015.7401606
Shan Liu, Fang Wang, Jianping Chai
With the popularity of smart phones and the rapid development of wireless communication technologies, people tend to determine their indoor location in the complex indoor environment such as a library, exhibition hall and shopping malls using location-based services. However, in many scenarios, two-dimensional positioning system has been unable to meet the needs. In this paper, we research on the three-dimensional positioning system using location fingerprinting techniques, improve the algorithm based on K Nearest Neighborhood, and establish the three-dimensional positioning system. The results showed that our simulation model can achieve a more accurate result than two-dimensional models.
{"title":"A three-dimensional positioning system based on RSSI for the wireless sensor network","authors":"Shan Liu, Fang Wang, Jianping Chai","doi":"10.1109/BMEI.2015.7401606","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401606","url":null,"abstract":"With the popularity of smart phones and the rapid development of wireless communication technologies, people tend to determine their indoor location in the complex indoor environment such as a library, exhibition hall and shopping malls using location-based services. However, in many scenarios, two-dimensional positioning system has been unable to meet the needs. In this paper, we research on the three-dimensional positioning system using location fingerprinting techniques, improve the algorithm based on K Nearest Neighborhood, and establish the three-dimensional positioning system. The results showed that our simulation model can achieve a more accurate result than two-dimensional models.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133530951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/BMEI.2015.7401610
Lihui Lan
Aiming at weighted social networks, a random perturbation method based on vectors similarity is proposed. It can protect structures and edge weights of weighted social networks in multiple release scenarios. First, it partitions weighted social networks into t sub-graphs by the segmentation method based on vertex cluster using edge space of graph theory, describes these sub-graphs by vectors, and constructs vector set models of weighted social networks. Then, it adopts weighted Euclidean distance as the metrics of vectors similarity to construct the released candidate sets of t sub-graphs according to the threshold designated by publishers. Finally, it randomly selects vectors from the candidate sets to construct the released vector set, and builds the published weighted social networks based on the released vector set. The proposed method can resist multiple vertex recognition attacks, force the attackers to re-identify in a large result set that the existential probabilities of the vectors are same, and increase the uncertainty of recognition. The experimental results on the actual datasets demonstrate that the proposed method can preserve the security of individuals' privacy, meanwhile it can protect some structure characteristics for social networks analysis and improve the released data utility.
{"title":"Preserving weighted social networks privacy using vectors similarity","authors":"Lihui Lan","doi":"10.1109/BMEI.2015.7401610","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401610","url":null,"abstract":"Aiming at weighted social networks, a random perturbation method based on vectors similarity is proposed. It can protect structures and edge weights of weighted social networks in multiple release scenarios. First, it partitions weighted social networks into t sub-graphs by the segmentation method based on vertex cluster using edge space of graph theory, describes these sub-graphs by vectors, and constructs vector set models of weighted social networks. Then, it adopts weighted Euclidean distance as the metrics of vectors similarity to construct the released candidate sets of t sub-graphs according to the threshold designated by publishers. Finally, it randomly selects vectors from the candidate sets to construct the released vector set, and builds the published weighted social networks based on the released vector set. The proposed method can resist multiple vertex recognition attacks, force the attackers to re-identify in a large result set that the existential probabilities of the vectors are same, and increase the uncertainty of recognition. The experimental results on the actual datasets demonstrate that the proposed method can preserve the security of individuals' privacy, meanwhile it can protect some structure characteristics for social networks analysis and improve the released data utility.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133564468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the space environment, a large number of cosmic rays often results in transient faults on on-board computers. And one of the main problems caused by these faults is the control flow errors in the program. This paper proposes a software-implemented control flow error detecting and correcting approach for the linear assembly named DCCLA. DCCLA firstly divides the program into loop blocks and non-loop blocks and assigns the formatted labels for the blocks. Then based on the mechanism of instructions counting, DCCLA inserts counting and comparing instructions into every block, with the purpose of detecting and correcting the control flow errors occurred inter-block and intra-block. In order to correct the data flow errors caused by the control flow errors, DCCLA backups the loop state and live variables. One advantage of DCCLA is that it can be configured flexibly according to the requirement of reliability and performance. The results of fault injection experiment shown that, the average fail rate of programs with DCCLA has decreased to 4.25% with the cost of increasing the average executing time by 41.7% and increasing the average program space by 46.7% DCCLA has the least influence on performance and space overhead and correspondingly higher reliability among three typical control flow detecting algorithms.
{"title":"An efficient approach to detect and correct control-flow errors for linear assembly","authors":"Yuanqiang Qiu, QingPing Tan, Jianjun Xu, Yuxiang Zhao","doi":"10.1109/BMEI.2015.7401567","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401567","url":null,"abstract":"In the space environment, a large number of cosmic rays often results in transient faults on on-board computers. And one of the main problems caused by these faults is the control flow errors in the program. This paper proposes a software-implemented control flow error detecting and correcting approach for the linear assembly named DCCLA. DCCLA firstly divides the program into loop blocks and non-loop blocks and assigns the formatted labels for the blocks. Then based on the mechanism of instructions counting, DCCLA inserts counting and comparing instructions into every block, with the purpose of detecting and correcting the control flow errors occurred inter-block and intra-block. In order to correct the data flow errors caused by the control flow errors, DCCLA backups the loop state and live variables. One advantage of DCCLA is that it can be configured flexibly according to the requirement of reliability and performance. The results of fault injection experiment shown that, the average fail rate of programs with DCCLA has decreased to 4.25% with the cost of increasing the average executing time by 41.7% and increasing the average program space by 46.7% DCCLA has the least influence on performance and space overhead and correspondingly higher reliability among three typical control flow detecting algorithms.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116703338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/BMEI.2015.7401608
Wei Sun, Xiaoying Song, Fasheng Wang
Clustering protocol for data gathering is one of the effective ways to solve the energy hole problem in wireless sensor networks. However, most of the existing clustering protocols focus on the network model with uniform node distribution. They cannot effectively apply to the real network where the sensor nodes are randomly non-uniformly deployed. In this paper, we propose an energy-balanced clustering routing protocol (EBCRP) based on task separation. In this scheme, the network is firstly divided into clusters by using global information. And each of them has the same number of sensor nodes in order to balance the energy consumption of intra-cluster. In succession, task separation, the tasks of traditional single cluster head are separated and achieved by two cluster heads respectively, is proposed to reduce the traffic burden for single cluster head. Then, we explore an energy-efficient and reliable inter-cluster routing algorithm, which considers comprehensively three factors: residual energy, distance and available buffer space of nodes. Simulation results and performance evaluation of EBCRP show significant improvement in network lifetime and energy balance.
{"title":"Energy-balanced clustering routing protocol based on task separation in wireless sensor networks","authors":"Wei Sun, Xiaoying Song, Fasheng Wang","doi":"10.1109/BMEI.2015.7401608","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401608","url":null,"abstract":"Clustering protocol for data gathering is one of the effective ways to solve the energy hole problem in wireless sensor networks. However, most of the existing clustering protocols focus on the network model with uniform node distribution. They cannot effectively apply to the real network where the sensor nodes are randomly non-uniformly deployed. In this paper, we propose an energy-balanced clustering routing protocol (EBCRP) based on task separation. In this scheme, the network is firstly divided into clusters by using global information. And each of them has the same number of sensor nodes in order to balance the energy consumption of intra-cluster. In succession, task separation, the tasks of traditional single cluster head are separated and achieved by two cluster heads respectively, is proposed to reduce the traffic burden for single cluster head. Then, we explore an energy-efficient and reliable inter-cluster routing algorithm, which considers comprehensively three factors: residual energy, distance and available buffer space of nodes. Simulation results and performance evaluation of EBCRP show significant improvement in network lifetime and energy balance.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131961624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/BMEI.2015.7401556
Tong Yu, Meng Cui, Lirong Jia
Traditional Chinese Medicine (TCM) is a medical system with a long history, and is still in-practice today. The TCM domain has a plenty of archaic and abstruse terms and a complex conceptual system. In the information age, a lot of work has been done to digitalize TCM knowledge assets for information retrieval, knowledge discovery, and other applications. A domain ontology helps to standardize TCM terminology and can be very useful in TCM informatics. Therefore, we have engineered a domain ontology named Traditional Chinese Medicine Language System (TCMLS), which contains approximately 300,000 terms, 120,000 concepts, and 1,270,000 semantic relations. The semantic network framework of TCMLS was published as the ISO technical specification "ISO/TS 17938:2014" in 2014. TCMLS has been successfully applied in many applications such as knowledge visualization, terminology integration, and text mining.
中医是一种历史悠久的医学体系,至今仍在实践中。中医领域有大量古老而深奥的术语和复杂的概念体系。在信息时代,中医药知识资产数字化已成为信息检索、知识发现等应用领域的重要内容。领域本体有助于中医术语的规范化,在中医信息学中具有重要的应用价值。因此,我们设计了一个领域本体,命名为中医语言系统(Traditional Chinese Medicine Language System, TCMLS),它包含了大约30万个术语、12万个概念和127万个语义关系。TCMLS的语义网络框架于2014年作为ISO技术规范“ISO/TS 17938:2014”发布。TCMLS已成功地应用于知识可视化、术语集成和文本挖掘等领域。
{"title":"Towards a TCM domain ontology: Standardization, ontology engineering, and applications","authors":"Tong Yu, Meng Cui, Lirong Jia","doi":"10.1109/BMEI.2015.7401556","DOIUrl":"https://doi.org/10.1109/BMEI.2015.7401556","url":null,"abstract":"Traditional Chinese Medicine (TCM) is a medical system with a long history, and is still in-practice today. The TCM domain has a plenty of archaic and abstruse terms and a complex conceptual system. In the information age, a lot of work has been done to digitalize TCM knowledge assets for information retrieval, knowledge discovery, and other applications. A domain ontology helps to standardize TCM terminology and can be very useful in TCM informatics. Therefore, we have engineered a domain ontology named Traditional Chinese Medicine Language System (TCMLS), which contains approximately 300,000 terms, 120,000 concepts, and 1,270,000 semantic relations. The semantic network framework of TCMLS was published as the ISO technical specification \"ISO/TS 17938:2014\" in 2014. TCMLS has been successfully applied in many applications such as knowledge visualization, terminology integration, and text mining.","PeriodicalId":119361,"journal":{"name":"2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133372007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}