A new report from Zhengzhou University in China discusses the need for large-scale constrained multi-objective optimization in personalized medicine. The researchers propose a new benchmark for testing algorithms in this field, taking into account realistic features such as mixed linkages between variables and varying numbers of constraint functions. They also introduce a bidirectional sampling strategy to improve algorithm performance in large-scale search spaces with constraints. The proposed algorithm is shown to be effective in solving personalized drug target recognition problems with over 2000 decision variables. [Extracted from the article]
MONTE Carlo method, ACADEMIC workload of students, ALGORITHMS, SCHEDULING, COLLEGE teachers, MATHEMATICAL models
Abstract
A technique of random choice is illustrated by application to the problem of assigning students to a fixed schedule of courses. Using the technique it is possible to reduce or eliminate difficulties that result when a popular section is filled and closed before oil students requesting and requiring it have been scheduled. The effectiveness of automatic scheduling is retained without loss of the students' privilege of picking favorite instructors. [ABSTRACT FROM AUTHOR]
ALGORITHMS, MAGNETIC resonance imaging, COLLEGE teachers
Abstract
The article reports on the development of an algorithm to speed up magnetic resonance imaging (MRI) process by associate professors Elfar Adalsteinsson and Vivek Goyal in 2011. The algorithm uses information derived from the first contrast scan to aid the production of subsequent images. In addition, the algorithm uses the first scan to portend the probable position of the boundaries between various types of tissue in the subsequent contrast scans.
COMPUTER password security, COLLEGE teachers, ALGORITHMS, WEBSITES
Abstract
The article discusses the human computable passwords being worked out by the Carnegie Mellon University computer science professor Manuel Blum, who won the Turing Award in 1995. Topics discussed include the use of an algorithm and private key for the creation and re-creation of unique passwords, the alternate letter and number provided by the algorithm in the name of the website, and the work needed for selecting and learning the key and algorithm.
Published
2015
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.