期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
大采高综采工作面上隅角高位钻孔瓦斯抽采技术研究与应用
1
作者 王斌荣 《中国设备工程》 2024年第15期237-240,共4页
本文针对大采高综采工作面上隅角高位钻孔瓦斯抽采技术难题,通过理论计算确定了采空区“三带”分布高度,为选择高位钻孔瓦斯抽采终孔位置层位奠定基础;同时对高位钻孔进行实践总结,全面分析采空区上覆岩层受采动动力场及瓦斯流动分布规... 本文针对大采高综采工作面上隅角高位钻孔瓦斯抽采技术难题,通过理论计算确定了采空区“三带”分布高度,为选择高位钻孔瓦斯抽采终孔位置层位奠定基础;同时对高位钻孔进行实践总结,全面分析采空区上覆岩层受采动动力场及瓦斯流动分布规律,经过方案设计优化和试验考察,掌握了不同层位钻孔布置影响瓦斯抽采的规律,为现场瓦斯抽采提供了理论依据,实现最大抽采化,确保工作面瓦斯“零超限”。 展开更多
关键词 高位钻孔设备 合理层位 抽采技术优化 瓦斯治理
下载PDF
On the role of optimization algorithms in ownership-preserving data mining 被引量:1
2
作者 Muhammad KAMRAN Ehsan Ullah MUNIR 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第2期151-164,共14页
Knowledge extraction from sensitive data often needs collaborative work. Statistical databases are generated from such data and shared among various stakeholders. In this context, the ownership protection of shared da... Knowledge extraction from sensitive data often needs collaborative work. Statistical databases are generated from such data and shared among various stakeholders. In this context, the ownership protection of shared data becomes important. Watermarking is emerging to be a very effective tool for imposing ownership rights on various digital data formats. Watermarking of such datasets may bring distortions in the data. Consequently, the extracted knowledge may be inaccurate. These distortions are controlled by the usability constraints, which in turn limit the available bandwidth for watermarking. Large bandwidth ensures robustness; however, it may degrade the quality of the data. Such a situation can be resolved by optimizing the available bandwidth subject to the usability constraints. Optimization techniques, particularly bioinspired techniques, have become a preferred choice for solving such issues during the past few years. In this paper, we investigate the usability of various optimization schemes for identifying the maximum available bandwidth to achieve two objectives:(1) preserving the knowledge stored in the data;(2) maximizing the available bandwidth subject to the usability constraints to achieve maximum robustness. The first objective is achieved with a usability constraint model, which ensures that the knowledge is not compromised as a result of watermark embedding. The second objective is achieved by finding the maximum bandwidth subject to the usability constraints specified in the first objective. The performance of optimization schemes is evaluated using different metrics. 展开更多
关键词 Information security Optimization Digital fights WATERMARKING
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部