Research Article

An Internet of Things (IoT)-Based Optimization to Enhance Security in Healthcare Applications

Algorithm 1

DDTHA.
Inputs: training examples ; code length h; maximum
iteration number p; parameter λ
Output: binary codes
Randomly select n examples from the trainingexamples and get the ;
Initialize as a {−1, 1}l vector randomly;
Initialize J as where
Use (9) to initialize ;
Use (7) to initialize P;
Repeat
   T-step: Use (12) to solve T;
   K-step: Use (9) to solve E;
   S-step: Use (7) to solve T;
To acquire the hash function qf, we must first train trees
Until convergence