|
An efficient approach to representing and mining knowledge from Qing court medical records
Weimin WANG, Jingchun ZHANG, Cong CAO, Tao HOU, Yue LIU, Keji CHEN
Front Comput Sci Chin. 2011, 5 (4): 395-404.
https://doi.org/10.1007/s11704-011-1021-y
Research on Qing Court Medical Records (RQCMR) is a large-volume book which was edited and annotated by the sixth co-author Keji, Chen and his colleagues, and consists of all the medical records of imperial families and aristocrats of the Qing dynasty. To reveal and utilize their high value both in traditional Chinese medicine research and modern clinical practice, we have developed a method of transforming the Qing Court Medical Records (QCMR) into a computer-readable, structured representation, so that statistical analysis and data mining can be accurately performed. The method consists of a frame ontology based medical language, called MedL, for representing QCMR, a parser for compiling MedL frames into a database, and an explorative pattern mining technique. With this method the entire RQCMR volume is transformed into a database and medical patterns may be mined from the database.
Figures and Tables |
References |
Related Articles |
Metrics
|
|
Nearest-neighbor classifier motivated marginal discriminant projections for face recognition
Pu HUANG, Zhenmin TANG, Caikou CHEN, Xintian CHENG
Front Comput Sci Chin. 2011, 5 (4): 419-428.
https://doi.org/10.1007/s11704-011-1012-z
Marginal Fisher analysis (MFA) is a representative margin-based learning algorithm for face recognition. A major problem in MFA is how to select appropriate parameters, k1 and k2, to construct the respective intrinsic and penalty graphs. In this paper, we propose a novel method called nearest-neighbor (NN) classifier motivated marginal discriminant projections (NN-MDP). Motivated by the NN classifier, NN-MDP seeks a few projection vectors to prevent data samples from being wrongly categorized. Like MFA, NN-MDP can characterize the compactness and separability of samples simultaneously. Moreover, in contrast to MFA, NN-MDP can actively construct the intrinsic graph and penalty graph without unknown parameters. Experimental results on the ORL, Yale, and FERET face databases show that NN-MDP not only avoids the intractability, and high expense of neighborhood parameter selection, but is also more applicable to face recognition with NN classifier than other methods.
Figures and Tables |
References |
Related Articles |
Metrics
|
|
Identity-based key distribution for mobile Ad Hoc networks
Xixiang LV, Hui LI, Baocang WANG
Front Comput Sci Chin. 2011, 5 (4): 442-447.
https://doi.org/10.1007/s11704-011-0197-5
An identity-based cryptosystem can make a special contribution to building key distribution and management architectures in resource-constrained mobile ad hoc networks since it does not suffer from certificate management problems. In this paper, based on a lightweight cryptosystem, elliptic curve cryptography (ECC), we propose an identity-based distributed key-distribution protocol for mobile ad hoc networks. In this protocol, using secret sharing, we build a virtual private key generator which calculates one part of a user’s secret key and sends it to the user via public channels, while, the other part of the secret key is generated by the user. So, the secret key of the user is generated collaboratively by the virtual authority and the user. Each has half of the secret information about the secret key of the user. Thus there is no secret key distribution problem. In addition, the user’s secret key is known only to the user itself, therefore there is no key escrow.
Figures and Tables |
References |
Related Articles |
Metrics
|
|
Non-cooperative optimization games in market-oriented overlay networks: an integrated model of resource pricing and network formation
Yutaka OKAIE, Tadashi NAKANO
Front Comput Sci Chin. 2011, 5 (4): 496-505.
https://doi.org/10.1007/s11704-011-0190-z
In this paper, we formulate a non-cooperative optimization game in market-oriented overlay networks where participating peers share their own computing resources to earn virtual money called energy. We model an overlay network as a set of non-cooperative resource providing peers, called platforms, that perform resource pricing and topology management to maximize their own energy gains. Resource consuming peers, called agents, are simply designed to migrate platform-to-platform to find the least expensive resources in the network. Simulation results are presented to demonstrate the market dynamics as well as the global properties of the network, i.e., resource price and network topology, that emerge from local interactions among the group of peers.
References |
Related Articles |
Metrics
|
|
A PTS-PGATS based approach for data-intensive scheduling in data grids
Kenli LI, Zhao TONG, Dan LIU, Teklay TESFAZGHI, Xiangke LIAO
Front Comput Sci Chin. 2011, 5 (4): 513-525.
https://doi.org/10.1007/s11704-011-0970-5
Grid computing is the combination of computer resources in a loosely coupled, heterogeneous, and geographically dispersed environment. Grid data are the data used in grid computing, which consists of large-scale data-intensive applications, producing and consuming huge amounts of data, distributed across a large number of machines. Data grid computing composes sets of independent tasks each of which require massive distributed data sets that may each be replicated on different resources. To reduce the completion time of the application and improve the performance of the grid, appropriate computing resources should be selected to execute the tasks and appropriate storage resources selected to serve the files required by the tasks. So the problem can be broken into two sub-problems: selection of storage resources and assignment of tasks to computing resources. This paper proposes a scheduler, which is broken into three parts that can run in parallel and uses both parallel tabu search and a parallel genetic algorithm. Finally, the proposed algorithm is evaluated by comparing it with other related algorithms, which target minimizing makespan. Simulation results show that the proposed approach can be a good choice for scheduling large data grid applications.
Figures and Tables |
References |
Related Articles |
Metrics
|
14 articles
|