IEEE Computational Intelligence Magazine - November 2020 - 66
A TCM prescription can have dozens of ingredients,
and a drug can have dozens of alternative drugs.
Therefore, the solution space of the problem
can be very large.
may also develop a prevention program for two similar clusters
as they consider appropriate. For a cluster with high-risk residents (with suspected symptoms of COVID-19 or serious
underlying illnesses), they can decide to develop one prevention
program for each resident.
When developing initial programs, the TCM experts aim
to maximize the prevention effect on residents of each cluster without considering the limits of medical resources
including herbal medicines, patent medicines, medical devices, pharmacists, and other paramedical personnel. If the
demands of the programs exceed the available resources, we
use an intelligent optimization algorithm to optimize the
programs subject to the resource constraints. However, any
prevention program produced by computer algorithms must
be checked and, if necessary, modified by the TCM experts
before implementation. The above process continues until all
prevention programs satisfy the resource constraints and are
approved by the TCM experts. Fig. 1 illustrates the interactive optimization process.
Perform FCM Clustering to Group Residents
Develop Prevention Programs Based
on Clustering Results
Calculate the Resources
Required by the Programs
Satisfy
Resource Constraints?
Y
N
Optimize the Programs
Subject to the Constraints
Check the Updated Programs
Modify
the Programs
N
Approved?
Y
Put into Implementation
FIGURE 1 Flowchart of the interactive optimization of TCM prevention
programs. Rectangles with dash borders are performed by TCM experts,
while rectangles with solid borders are performed by computer.
66
IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE | NOVEMBER 2020
A. Optimization Problem
The prevention program optimization problem is formulated as follows. TCM experts
have developed N basic prevention programs,
denoted by {P1, P2, f, PN }, for residents from
M communities. The programs involve K
types of drugs, K1 types of other medical
resources (such as TCM material and movable
devices) that can be shared among the communities, and K2
types of other medical resources (such as immovable devices
and staff belonging to given communities) that cannot be
shared among the communities. When there is no confusion,
we use k as the index for the above three classes of resources.
The problem is to optimize the distribution of medical
resources among the prevention programs for the M communities. In the local region, the total available quantity of each drug
k is qt Dk ^1 # k # K h, total available quantity of each other
sharable resource k is qt Gk ^1 # k # K 1h, and available quantity
of each non-sharable resource k in community i is qt Fik
^1 # k # K 2; 1 # i # M h .
Each prevention program Pj has the following attributes
^1 # j # N h:
❏❏ The number nj of residents using the program;
❏❏ The set H j of communities that have residents using the
program; for each community i ! H j, the number of residents using the program is n ij;
❏❏ The set U j of drugs used by the program; for each drug
k ! U j, the quantity used per prescription is q Djk;
❏❏ The set W j of other sharable resources used by the program;
for each resource k ! W j, the quantity used per prescription
is q Gjk;
❏❏ The set X j of other non-sharable resources used by the
program; for each resource k ! X j, the quantity used per
prescription is q Fjk;
In a TCM prescription, many ingredients have alternatives.
We use Ulj 1 U j to denote the subset of drugs that have alternatives in P j; for each drug k ! Ulj , we use a list Kk to store its
alternative drugs in decreasing order of priority, which are
determined by TCM drug properties and effects to the disease
(COVID-19 belongs to pulmonary disease in TCM). We consider two types of updates on a TCM prescription:
❏❏ Replacing an auxiliary drug k ! Ulj with an alternative
drug kl ! K k, for example, replacing coix seed with winter
melon seed;
❏❏ Replacing a main drug k ! Ulj with an alternative drug
kl ! K k; however, according to compatibility of TCM, a
main drug is related to one or more auxiliary drugs, and the
corresponding auxiliary drugs should also be reapplied; an
example is replacing "astragalus membranaceus (main) +
cinnamon (auxiliary)" with "codonopsis pilosula (main) +
yam (auxiliary)."
To prevent the updated prescriptions from deviating too
much from the original prescriptions developed by TCM
experts, for each prevention program, we allow at most one
drug (except auxiliary drugs related to a main updated drug) to
IEEE Computational Intelligence Magazine - November 2020
Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - November 2020
Contents
IEEE Computational Intelligence Magazine - November 2020 - Cover1
IEEE Computational Intelligence Magazine - November 2020 - Cover2
IEEE Computational Intelligence Magazine - November 2020 - Contents
IEEE Computational Intelligence Magazine - November 2020 - 2
IEEE Computational Intelligence Magazine - November 2020 - 3
IEEE Computational Intelligence Magazine - November 2020 - 4
IEEE Computational Intelligence Magazine - November 2020 - 5
IEEE Computational Intelligence Magazine - November 2020 - 6
IEEE Computational Intelligence Magazine - November 2020 - 7
IEEE Computational Intelligence Magazine - November 2020 - 8
IEEE Computational Intelligence Magazine - November 2020 - 9
IEEE Computational Intelligence Magazine - November 2020 - 10
IEEE Computational Intelligence Magazine - November 2020 - 11
IEEE Computational Intelligence Magazine - November 2020 - 12
IEEE Computational Intelligence Magazine - November 2020 - 13
IEEE Computational Intelligence Magazine - November 2020 - 14
IEEE Computational Intelligence Magazine - November 2020 - 15
IEEE Computational Intelligence Magazine - November 2020 - 16
IEEE Computational Intelligence Magazine - November 2020 - 17
IEEE Computational Intelligence Magazine - November 2020 - 18
IEEE Computational Intelligence Magazine - November 2020 - 19
IEEE Computational Intelligence Magazine - November 2020 - 20
IEEE Computational Intelligence Magazine - November 2020 - 21
IEEE Computational Intelligence Magazine - November 2020 - 22
IEEE Computational Intelligence Magazine - November 2020 - 23
IEEE Computational Intelligence Magazine - November 2020 - 24
IEEE Computational Intelligence Magazine - November 2020 - 25
IEEE Computational Intelligence Magazine - November 2020 - 26
IEEE Computational Intelligence Magazine - November 2020 - 27
IEEE Computational Intelligence Magazine - November 2020 - 28
IEEE Computational Intelligence Magazine - November 2020 - 29
IEEE Computational Intelligence Magazine - November 2020 - 30
IEEE Computational Intelligence Magazine - November 2020 - 31
IEEE Computational Intelligence Magazine - November 2020 - 32
IEEE Computational Intelligence Magazine - November 2020 - 33
IEEE Computational Intelligence Magazine - November 2020 - 34
IEEE Computational Intelligence Magazine - November 2020 - 35
IEEE Computational Intelligence Magazine - November 2020 - 36
IEEE Computational Intelligence Magazine - November 2020 - 37
IEEE Computational Intelligence Magazine - November 2020 - 38
IEEE Computational Intelligence Magazine - November 2020 - 39
IEEE Computational Intelligence Magazine - November 2020 - 40
IEEE Computational Intelligence Magazine - November 2020 - 41
IEEE Computational Intelligence Magazine - November 2020 - 42
IEEE Computational Intelligence Magazine - November 2020 - 43
IEEE Computational Intelligence Magazine - November 2020 - 44
IEEE Computational Intelligence Magazine - November 2020 - 45
IEEE Computational Intelligence Magazine - November 2020 - 46
IEEE Computational Intelligence Magazine - November 2020 - 47
IEEE Computational Intelligence Magazine - November 2020 - 48
IEEE Computational Intelligence Magazine - November 2020 - 49
IEEE Computational Intelligence Magazine - November 2020 - 50
IEEE Computational Intelligence Magazine - November 2020 - 51
IEEE Computational Intelligence Magazine - November 2020 - 52
IEEE Computational Intelligence Magazine - November 2020 - 53
IEEE Computational Intelligence Magazine - November 2020 - 54
IEEE Computational Intelligence Magazine - November 2020 - 55
IEEE Computational Intelligence Magazine - November 2020 - 56
IEEE Computational Intelligence Magazine - November 2020 - 57
IEEE Computational Intelligence Magazine - November 2020 - 58
IEEE Computational Intelligence Magazine - November 2020 - 59
IEEE Computational Intelligence Magazine - November 2020 - 60
IEEE Computational Intelligence Magazine - November 2020 - 61
IEEE Computational Intelligence Magazine - November 2020 - 62
IEEE Computational Intelligence Magazine - November 2020 - 63
IEEE Computational Intelligence Magazine - November 2020 - 64
IEEE Computational Intelligence Magazine - November 2020 - 65
IEEE Computational Intelligence Magazine - November 2020 - 66
IEEE Computational Intelligence Magazine - November 2020 - 67
IEEE Computational Intelligence Magazine - November 2020 - 68
IEEE Computational Intelligence Magazine - November 2020 - 69
IEEE Computational Intelligence Magazine - November 2020 - 70
IEEE Computational Intelligence Magazine - November 2020 - 71
IEEE Computational Intelligence Magazine - November 2020 - 72
IEEE Computational Intelligence Magazine - November 2020 - 73
IEEE Computational Intelligence Magazine - November 2020 - 74
IEEE Computational Intelligence Magazine - November 2020 - 75
IEEE Computational Intelligence Magazine - November 2020 - 76
IEEE Computational Intelligence Magazine - November 2020 - Cover3
IEEE Computational Intelligence Magazine - November 2020 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com