{"title":"Approximation for preemptive scheduling stochastic jobs on identical parallel machines","authors":"Xiaoyong Tang, Kenli Li, Fan Wu","doi":"10.1109/BICTA.2010.5645076","DOIUrl":"https://doi.org/10.1109/BICTA.2010.5645076","url":null,"abstract":"In this paper, the stochastic scheduling problem of minimizing the total weighted completion time on preemptive identical parallel machines is investigated. Each job has a processing time, which is a random variable and just given their distribution function. First, we extend the stochastic single-machine preemptive WSEPT rule to a multi-machine list scheduling policy, which we call P-WSEPT. T hen, we use LP based policy to analysis the performance guarantee of preemptive stochastic scheduling with release dates.","PeriodicalId":302619,"journal":{"name":"2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128829146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yong-yong Zhang, Qiang Huang, Fan Gao, Xiao-yi Sun
{"title":"Optimal reservoir operation using a hybrid Simulated Annealing Algorithm-Genetic Algorithm","authors":"Yong-yong Zhang, Qiang Huang, Fan Gao, Xiao-yi Sun","doi":"10.1109/BICTA.2010.5645168","DOIUrl":"https://doi.org/10.1109/BICTA.2010.5645168","url":null,"abstract":"A hybrid Simulated Annealing Algorithm-Genetic Algorithm is used to study the optimal reservoir operation. Then compared with other three methods, such as Genetic Algorithm, POA, and traditional Dynamic Programming, the proposed algorithm has much stronger ability of global search as well as better convergence property and can find the global optimization solution quickly. It is showed that hybrid Simulated Annealing Algorithm-Genetic Algorithm is an effective optimal algorithm and can be applied to the reservoir operation.","PeriodicalId":302619,"journal":{"name":"2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121029114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gao Yang, Zhuang Yi, Ni Tianquan, Yi Keke, Xue Tongtong
{"title":"An improved genetic algorithm for wireless sensor networks localization","authors":"Gao Yang, Zhuang Yi, Ni Tianquan, Yi Keke, Xue Tongtong","doi":"10.1109/BICTA.2010.5645165","DOIUrl":"https://doi.org/10.1109/BICTA.2010.5645165","url":null,"abstract":"Genetic algorithm in the wireless sensor networks localization has a problem that positioning errors of some nodes are larger, in this paper we propose an improved algorithm based on genetic algorithm with filter replenishment strategy(FRGA), we improve the regional constraint of the initial population of genetic algorithm, and introduce the filter and replenishment strategy, from the perspective of population differences in performance, we delete the poor individual to maintain population overall performance, and solve the problem that localization accuracy of some nodes is poor which caused by the premature convergence. Experiments show that the localization accuracy of the improved algorithm is better than the GA, and the improved algorithm has faster convergence speed, and suitable for large-scale wireless sensor networks.","PeriodicalId":302619,"journal":{"name":"2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125847572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Redeployment of cluster heads in wireless sensor networks with genetic algorithm","authors":"A. Ghaffari, Farhad Nematy, N. Rahmani","doi":"10.1109/BICTA.2010.5645087","DOIUrl":"https://doi.org/10.1109/BICTA.2010.5645087","url":null,"abstract":"Since the appearance of wireless sensor networks, many researchers are challenging to improve its different parameters. Coverage is one of the important parameters for wireless sensor networks. In this paper we propose a genetic algorithm which is trying to increase members of each cluster by relocating cluster heads and consequently increase the whole number of clustered sensors in the network. Experimental results show that our algorithm can increase coverage by relocating cluster heads to positions with more density of sensors.","PeriodicalId":302619,"journal":{"name":"2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)","volume":"625 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127931801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A network comparison algorithm for predicting the conservative interaction regions in protein-protein interaction network","authors":"Lihong Peng, Lipeng Liu, Shi Chen, Quanwei Sheng","doi":"10.1109/BICTA.2010.5645297","DOIUrl":"https://doi.org/10.1109/BICTA.2010.5645297","url":null,"abstract":"We presented a network comparison algorithm for predicting the conservative interaction regions in the cross-species protein-protein interaction networks (PINs). In the first place, We made use of the correlated matrix to represent the PINs. Then we standardized the matrix and changed it into a unique representation to facilitate to judge whether the subgraphs is isomorphic. Then we proposed a network comparison algorithm based on the correlated matrix, edge-betweenness and the maximal frequent subgraphs mining. We used the tag grath library composed of the multiple PINs as input data and mined the maximal frequent subgraphs in the cross-species PINs by the algorithm. In the second place, we clustered and merged the similar but different and duplicate locally regions according to the similarity between them and the principle of sigle linkage clustering. In the end we analysed the resulting subgraphs and predicted the conservative interaction regions. The results showed the network comparison algorithm based on mining the frequent subgraplhs can be successfully applied to discover the conservative interaction regions, that is, we can find the functional complexes and predict the protein function. Furthermore, we can predict the interaction will exist in the other species when the conservative regions meet or exceed the threshold of minimum support.","PeriodicalId":302619,"journal":{"name":"2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129033885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QuantWiz: A scalable parallel software package for label-free protein quantification","authors":"Junchang Wang, Yunquan Zhang, Xianyi Zhang, Xiangzheng Sun, Q. Sheng","doi":"10.1109/BICTA.2010.5645126","DOIUrl":"https://doi.org/10.1109/BICTA.2010.5645126","url":null,"abstract":"In the context of the prosperous development of Proteomics in life science, protein quantification, especially these based on Mass Spectrometry (short for MS) method, becomes an essential part of research. In our previous work, we developed a new software package called QuantWiz for high performance Liquid Chromatography (short for LC)-MS-based label-free protein quantification. We solved those problems of portability, applicability and longtime running existed in other software for protein quantification based on MS method. In this paper, we first compared the LC-MS-based label-free protein quantification accuracy of QuantWiz with the well-known Census software package. Then we designed and implemented a distributed memory version parallel algorithm for QuantWiz. Finally, we performed scalability testing of our new parallel algorithm and showed that our new parallel algorithm can scale up to 512 processes on Dawning 5000A.","PeriodicalId":302619,"journal":{"name":"2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127330240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stateless multicounter 5′ → 3′ Watson-Crick automata","authors":"Ö. Eğecioğlu, László Hegedüs, B. Nagy","doi":"10.1109/BICTA.2010.5645263","DOIUrl":"https://doi.org/10.1109/BICTA.2010.5645263","url":null,"abstract":"The model we consider are stateless counter machines which mix the features of one-head counter machines and special two-head Watson-Crick automata (WK-automata). These biologically motivated machines have reading heads that read the input starting from the two extremes. The reading process is finished when the heads meet. The machine is realtime or non-realtime depending on whether the heads are required to advance at each move. A counter machine is k-reversal if each counter makes at most k alternations between increasing mode and decreasing mode on any computation, and reversal bounded if it is k-reversal for some k. In this paper we concentrate on the properties of deterministic stateless realtime WK-automata with counters that are reversal bounded. We give examples and establish hierarchies with respect to counters and reversals. Even I-counter stateless WK-automata turn out to be quite powerful.","PeriodicalId":302619,"journal":{"name":"2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122192169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A genetic algorithm for construction of recognizers of anomalies in behaviour of dynamical systems","authors":"D. Kovalenko, V. Kostenko","doi":"10.1109/BICTA.2010.5645318","DOIUrl":"https://doi.org/10.1109/BICTA.2010.5645318","url":null,"abstract":"In this paper, the problem of automatic construction of recognizers of anomalies in behaviour of complicated dynamical systems is considered. Information about system behaviour is available in a form of multidimensional trajectories (time-series) obtained from sensors surrounding the system. A specific feature of the problem consists in the fact that, depending on the individual properties of the system and conditions of its operation, trajectories that contain anomalies may significantly differ from each other in amplitude and length. The genetic algorithm described here allows to construct recognizers of abnormal behaviour of complicated dynamical systems.","PeriodicalId":302619,"journal":{"name":"2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130707882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two-phase biomedical named entity recognition based on semi-CRFs","authors":"Li Yang, Yanhong Zhou","doi":"10.1109/BICTA.2010.5645108","DOIUrl":"https://doi.org/10.1109/BICTA.2010.5645108","url":null,"abstract":"As a crucial step for the other tasks, such as human gene/protein normalization, relationship extraction and hypothesis generation, biomedical named entity recognition remains a challenging task. This paper represents a two-phase approach based on semi-CRFs and novel feature sets. Semi-CRFs put the label to a segment not a single word which is more natural than the other machine learning methods. Our approach divides the whole biomedical NER into two sub-tasks: term boundary detection and semantic labeling. At the first phase, term boundary detection sub-task detects the boundary of the entities and classifies the entities into one type C. At the second phase, semantic labeling sub-task label the entities detected at the first phase the correct entity type. To make a comparison, experiments conducted both on CRFs model and semi-CRFs model at each phase. Our experiments carried out on JNLPBA2004 datasets achieve an F-score of 73.20% based on semi-CRFs without deep domain knowledge and post-processing algorithm, which outperforms most of the state-of-the-art systems.","PeriodicalId":302619,"journal":{"name":"2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132542575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The application of fixed-length three DNA Segments encoding to maximum flow problem","authors":"Zhou Kang, H. Yufang, Cheng Zhen, Dong Yafei","doi":"10.1109/BICTA.2010.5645343","DOIUrl":"https://doi.org/10.1109/BICTA.2010.5645343","url":null,"abstract":"Fixed-length three DNA Segments encoding is brought forward. Therefore, closed circle DNA computing model is extended. The same position of extended closed circle DNA is divided into three sections corresponding to three function areas. The three function areas are addition segment, filling segment and subtraction segment, so extended closed circle DNA computing model can do addition operation and subtraction operation with simultaneous. For maximum flow problem, DNA algorithm is designed based on extended closed circle DNA computing model. In the DNA algorithm, fixed-length three DNA Segments encoding is encoded for flow rate of every arc, and all capacity feasible flows are formed. Then all feasible flows are filtered out by doing group insert experiment, group delete experiment and electrophoresis experiment. Using the same method all maximum flows are filtered out. Finally all maximum flows are obtained by doing detect experiment. Correctness and complexity of the algorithm are analyzed and proved. And a simulation experiment is done to verify validity of the DNA algorithm. This encoding mode is discovered firstly, and it is firstly using DNA computing from beginning to end to thoroughly solve maximum flow problem, so a conclusion can be drawn that the innovation of DNA encoding structure can solve more complicated and more extensive problems by DNA computing.","PeriodicalId":302619,"journal":{"name":"2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128602782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}