Phreatic water resources are widely found in thick unconsolidated surface layers in western China, where water levels respond sensitively and quickly to large-scale underground mining in conjunction with shallow coal ...Phreatic water resources are widely found in thick unconsolidated surface layers in western China, where water levels respond sensitively and quickly to large-scale underground mining in conjunction with shallow coal seams. Longwall face #32201 of the Bulianta Coal Mine, in the Shendong coalfield was selected as an industrial trail base, where field observations on ground-water levels were conducted when the working face was below a water-rich area. The space-time variation in the behavior of un-consolidated water levels in response to underground mining and its relation with of advance were observed through the field trials. The basic conditions for water preservation in mines are presented and the mechanisms of water preservation in mining analyzed, given the geological condition of two key strata and a severely weathered layer buried in the overburden. The field trails show that water preservation in mining shallow coal seams can be successful under suitable conditions, providing new technology for envi-ronmental protection in the desert coalfields of northwestern China.展开更多
As shallow resources are increasingly depleted,the mechanics'theory and testing technology of deep insitu rock has become urgent.Traditional coring technologies obtain rock samples without retaining the in-situ en...As shallow resources are increasingly depleted,the mechanics'theory and testing technology of deep insitu rock has become urgent.Traditional coring technologies obtain rock samples without retaining the in-situ environmental conditions,leading to distortion of the measured parameters.Herein,a coring and testing systems retaining in-situ geological conditions is presented:the coring system that obtains in-situ rock samples,and the transfer and testing system that stores and analyzes the rocks under a reconstructed environment.The ICP-Coring system mainly consists of the pressure controller,active insulated core reactor and insulation layer and sealing film.The ultimate bearing strength of 100 MPa for pressurepreservation,temperature control accuracy of 0.97%for temperature-retained are realized.CH_(4)and CO permeability of the optimized sealing film are as low as 3.85 and 0.33 ppm/min.The average tensile elongation of the film is 152.4%and the light transmittance is reduced to 0%.Additionally,the pressure and steady-state temperature accuracy for reconstructing the in-situ environment of transfer and storage system up to 1%and±0.2 is achieved.The error recorded of the noncontact sensor ring made of lowdensity polymer is less than 6%than that of the contact test.The system can provide technical support for the deep in-situ rock mechanics research,improving deep resource acquisition capabilities and further clarifying deep-earth processes.展开更多
Data mining is the extraction of vast interesting patterns or knowledge from huge amount of data. The initial idea of privacy-preserving data mining PPDM was to extend traditional data mining techniques to work with t...Data mining is the extraction of vast interesting patterns or knowledge from huge amount of data. The initial idea of privacy-preserving data mining PPDM was to extend traditional data mining techniques to work with the data modified to mask sensitive information. The key issues were how to modify the data and how to recover the data mining result from the modified data. Privacy-preserving data mining considers the problem of running data mining algorithms on confidential data that is not supposed to be revealed even to the party running the algorithm. In contrast, privacy-preserving data publishing (PPDP) may not necessarily be tied to a specific data mining task, and the data mining task may be unknown at the time of data publishing. PPDP studies how to transform raw data into a version that is immunized against privacy attacks but that still supports effective data mining tasks. Privacy-preserving for both data mining (PPDM) and data publishing (PPDP) has become increasingly popular because it allows sharing of privacy sensitive data for analysis purposes. One well studied approach is the k-anonymity model [1] which in turn led to other models such as confidence bounding, l-diversity, t-closeness, (α,k)-anonymity, etc. In particular, all known mechanisms try to minimize information loss and such an attempt provides a loophole for attacks. The aim of this paper is to present a survey for most of the common attacks techniques for anonymization-based PPDM & PPDP and explain their effects on Data Privacy.展开更多
In recent years,with the explosive development in Internet,data storage and data processing technologies,privacy preservation has been one of the greater concerns in data mining.A number of methods and techniques have...In recent years,with the explosive development in Internet,data storage and data processing technologies,privacy preservation has been one of the greater concerns in data mining.A number of methods and techniques have been developed for privacy preserving data mining.This paper provided a wide survey of different privacy preserving data mining algorithms and analyzed the representative techniques for privacy preservation.The existing problems and directions for future research are also discussed.展开更多
Water-preservation mining is one of the most important parts of the ‘Green Mining' technology system,which can realize the effective regulation of groundwater resources by controlling strata movement,changing pas...Water-preservation mining is one of the most important parts of the ‘Green Mining' technology system,which can realize the effective regulation of groundwater resources by controlling strata movement,changing passive prevention and governance of water disasters to active conservation and utilization of groundwater resources and thus obtaining coal and water simultaneously in mining.The concept of water-resistant key strata further enriches the content of the key stratum theory and provides a theoretical basis for water-preservation mining.In order to realize the idea of water-resistant key strata as a guideline in the design of water-preservation mining and engineering applications,the conditions for discrimination in the process of water-resistant key strata,we have presented a mechanical model,as well as its corresponding computer program,based on a large number of theoretical analyses and field measurements,as well as on a comprehensive consideration of the position,structural stability and seepage stability of key strata.Practical engineering applications indicate that this discrimination method and its corresponding computer program on water-resistant key strata are accurate and reliable and can satisfy the actual design needs of water-preservation mining and thus have instructional importance for water-preservation mining in mining areas lacking water.展开更多
Protecting the privacy of data in the multi-cloud is a crucial task.Data mining is a technique that protects the privacy of individual data while mining those data.The most significant task entails obtaining data from...Protecting the privacy of data in the multi-cloud is a crucial task.Data mining is a technique that protects the privacy of individual data while mining those data.The most significant task entails obtaining data from numerous remote databases.Mining algorithms can obtain sensitive information once the data is in the data warehouse.Many traditional algorithms/techniques promise to provide safe data transfer,storing,and retrieving over the cloud platform.These strategies are primarily concerned with protecting the privacy of user data.This study aims to present data mining with privacy protection(DMPP)using precise elliptic curve cryptography(PECC),which builds upon that algebraic elliptic curve infinitefields.This approach enables safe data exchange by utilizing a reliable data consolidation approach entirely reliant on rewritable data concealing techniques.Also,it outperforms data mining in terms of solid privacy procedures while maintaining the quality of the data.Average approximation error,computational cost,anonymizing time,and data loss are considered performance measures.The suggested approach is practical and applicable in real-world situations according to the experimentalfindings.展开更多
Recently,many data anonymization methods have been proposed to protect privacy in the applications of data mining.But few of them have considered the threats from user's priori knowledge of data patterns.To solve ...Recently,many data anonymization methods have been proposed to protect privacy in the applications of data mining.But few of them have considered the threats from user's priori knowledge of data patterns.To solve this problem,a flexible method was proposed to randomize the dataset,so that the user could hardly obtain the sensitive data even knowing data relationships in advance.The method also achieves a high level of accuracy in the mining process as demonstrated in the experiments.展开更多
Objective:To summarize the medication rules of Chinese herbs to treat heart failure with preserved ejection fraction(HFPEF)based on data mining and to provide references for clinical utilization.Methods:The China Nati...Objective:To summarize the medication rules of Chinese herbs to treat heart failure with preserved ejection fraction(HFPEF)based on data mining and to provide references for clinical utilization.Methods:The China National Knowledge Infrastructure(CNKI),Wanfang database(Wanfang),VIP database(VIP),Chinese Biomedical Literature(CBM),PubMed,Embase,and Cochrane Library databases were searched from inception to October 2021 to identify relevant literature on treating HFPEF with Chinese herbs.Microsoft Excel 2019 was used to set up a database,and then,association rule analysis and hierarchical cluster analysis were performed by using apriori algorithm and hclust function respectively in R-Studio(Version 4.0.3).Results:A total of 182 qualified papers were included,involving a total of 92 prescriptions,130 Chinese herbs,and 872 individual herbs prescribed,with an average of 9.5 herbs per prescription.The six most frequently prescribed herbs were Astragali Radix(Huangqi),Salviae Miltiorrhizae Radix Et Rhizoma(Danshen),Poria(Fuling),Glycyrrhizae Radix Et Rhizoma(Gancao),Cinnamomi Ramulus(Guizhi),and Ginseng Radix Et Rhizoma(Renshen).There were 35 herbs used more than 5 times,involving 11 efficacy categories.The top three categories were deficiency-tonifying herbs,blood-activating and stasis-removing herbs,and dampnessdraining diuretic herbs.The most commonly used herbs were mainly warm and sweet.The primary meridian tropisms were Lung Meridian,Heart Meridian and Spleen Meridian.Association rule analysis yielded 26 association rules,such as Astragali Radix(Huangqi)&Salviae Miltiorrhizae Radix Et Rhizoma(Danshen),Poria(Fuling),Cinnamomi Ramulus(Guizhi)&Atractylodis Macrocephalae Rhizoma(Baizhu).Hierarchical cluster analysis yielded four herb classes,and their functions were mainly qi-replenishing and yang-warming,bloodactivating and diuresis-inducing.Conclusions:HFPEF is the syndrome of root vacuity and tip repletion,and its core pathogenesis is"deficiency","stasis",and"wafer",with"deficiency"being the most principal,which is closely related to Xin(heart),Fei(Lung),and Pi(Spleen).The treatment of this disease occurs by improving qi,warming yang,activating blood and inducing diuresis.Astragali Radix(Huangqi)with Salviae Miltiorrhizae Radix Et Rhizoma(Danshen)is the basic combination of herbs applied.展开更多
基金supports for this work provided by the Research Fund of the State Key Laboratory of Coal Resources and Mine Safety (NoSKLCRSM08X2)the Jiangsu "333" High Qualified Talents, the National Natural Science Foundation of China (No50904063)the Scientific Research Foundation of China University of Mining & Technology (Nos.2008A003 and 2009A001)
文摘Phreatic water resources are widely found in thick unconsolidated surface layers in western China, where water levels respond sensitively and quickly to large-scale underground mining in conjunction with shallow coal seams. Longwall face #32201 of the Bulianta Coal Mine, in the Shendong coalfield was selected as an industrial trail base, where field observations on ground-water levels were conducted when the working face was below a water-rich area. The space-time variation in the behavior of un-consolidated water levels in response to underground mining and its relation with of advance were observed through the field trials. The basic conditions for water preservation in mines are presented and the mechanisms of water preservation in mining analyzed, given the geological condition of two key strata and a severely weathered layer buried in the overburden. The field trails show that water preservation in mining shallow coal seams can be successful under suitable conditions, providing new technology for envi-ronmental protection in the desert coalfields of northwestern China.
基金supported by the Program for Guangdong Introducing Innovative and Enterpreneurial Teams(No.2019ZT08G315)National Natural Science Foundation of China(No.51827901,U2013603,and 52004166)。
文摘As shallow resources are increasingly depleted,the mechanics'theory and testing technology of deep insitu rock has become urgent.Traditional coring technologies obtain rock samples without retaining the in-situ environmental conditions,leading to distortion of the measured parameters.Herein,a coring and testing systems retaining in-situ geological conditions is presented:the coring system that obtains in-situ rock samples,and the transfer and testing system that stores and analyzes the rocks under a reconstructed environment.The ICP-Coring system mainly consists of the pressure controller,active insulated core reactor and insulation layer and sealing film.The ultimate bearing strength of 100 MPa for pressurepreservation,temperature control accuracy of 0.97%for temperature-retained are realized.CH_(4)and CO permeability of the optimized sealing film are as low as 3.85 and 0.33 ppm/min.The average tensile elongation of the film is 152.4%and the light transmittance is reduced to 0%.Additionally,the pressure and steady-state temperature accuracy for reconstructing the in-situ environment of transfer and storage system up to 1%and±0.2 is achieved.The error recorded of the noncontact sensor ring made of lowdensity polymer is less than 6%than that of the contact test.The system can provide technical support for the deep in-situ rock mechanics research,improving deep resource acquisition capabilities and further clarifying deep-earth processes.
文摘Data mining is the extraction of vast interesting patterns or knowledge from huge amount of data. The initial idea of privacy-preserving data mining PPDM was to extend traditional data mining techniques to work with the data modified to mask sensitive information. The key issues were how to modify the data and how to recover the data mining result from the modified data. Privacy-preserving data mining considers the problem of running data mining algorithms on confidential data that is not supposed to be revealed even to the party running the algorithm. In contrast, privacy-preserving data publishing (PPDP) may not necessarily be tied to a specific data mining task, and the data mining task may be unknown at the time of data publishing. PPDP studies how to transform raw data into a version that is immunized against privacy attacks but that still supports effective data mining tasks. Privacy-preserving for both data mining (PPDM) and data publishing (PPDP) has become increasingly popular because it allows sharing of privacy sensitive data for analysis purposes. One well studied approach is the k-anonymity model [1] which in turn led to other models such as confidence bounding, l-diversity, t-closeness, (α,k)-anonymity, etc. In particular, all known mechanisms try to minimize information loss and such an attempt provides a loophole for attacks. The aim of this paper is to present a survey for most of the common attacks techniques for anonymization-based PPDM & PPDP and explain their effects on Data Privacy.
基金This work was supported by the National Social Science Foundation Project of China under Grant 16BTQ085.
文摘In recent years,with the explosive development in Internet,data storage and data processing technologies,privacy preservation has been one of the greater concerns in data mining.A number of methods and techniques have been developed for privacy preserving data mining.This paper provided a wide survey of different privacy preserving data mining algorithms and analyzed the representative techniques for privacy preservation.The existing problems and directions for future research are also discussed.
基金supported by the National Natural Science Foundation of China (No.50874103)the National Basic Research Program of China (Nos.2006CB202210 and 2007CB209408)+1 种基金the Natural Science Foundation of Jiangsu Province (No.KB2008135)the Qinglan Project of Jiangsu Province
文摘Water-preservation mining is one of the most important parts of the ‘Green Mining' technology system,which can realize the effective regulation of groundwater resources by controlling strata movement,changing passive prevention and governance of water disasters to active conservation and utilization of groundwater resources and thus obtaining coal and water simultaneously in mining.The concept of water-resistant key strata further enriches the content of the key stratum theory and provides a theoretical basis for water-preservation mining.In order to realize the idea of water-resistant key strata as a guideline in the design of water-preservation mining and engineering applications,the conditions for discrimination in the process of water-resistant key strata,we have presented a mechanical model,as well as its corresponding computer program,based on a large number of theoretical analyses and field measurements,as well as on a comprehensive consideration of the position,structural stability and seepage stability of key strata.Practical engineering applications indicate that this discrimination method and its corresponding computer program on water-resistant key strata are accurate and reliable and can satisfy the actual design needs of water-preservation mining and thus have instructional importance for water-preservation mining in mining areas lacking water.
文摘Protecting the privacy of data in the multi-cloud is a crucial task.Data mining is a technique that protects the privacy of individual data while mining those data.The most significant task entails obtaining data from numerous remote databases.Mining algorithms can obtain sensitive information once the data is in the data warehouse.Many traditional algorithms/techniques promise to provide safe data transfer,storing,and retrieving over the cloud platform.These strategies are primarily concerned with protecting the privacy of user data.This study aims to present data mining with privacy protection(DMPP)using precise elliptic curve cryptography(PECC),which builds upon that algebraic elliptic curve infinitefields.This approach enables safe data exchange by utilizing a reliable data consolidation approach entirely reliant on rewritable data concealing techniques.Also,it outperforms data mining in terms of solid privacy procedures while maintaining the quality of the data.Average approximation error,computational cost,anonymizing time,and data loss are considered performance measures.The suggested approach is practical and applicable in real-world situations according to the experimentalfindings.
文摘Recently,many data anonymization methods have been proposed to protect privacy in the applications of data mining.But few of them have considered the threats from user's priori knowledge of data patterns.To solve this problem,a flexible method was proposed to randomize the dataset,so that the user could hardly obtain the sensitive data even knowing data relationships in advance.The method also achieves a high level of accuracy in the mining process as demonstrated in the experiments.
文摘目的分析中医药治疗射血分数保留心力衰竭(HFpEF)的核心处方及类方的用药规律,为HFpEF临床遣药组方提供参考。方法检索中国知识资源总库(CNKI)、中国学术期刊数据库(Wanfang Data)、中文科技期刊数据库(VIP)、中国生物医学文献数据库(CBM)、PubMed、Web of Science、Embase、Cochrane Library建库至2023年11月1日收录的中医药治疗HFpEF临床研究文献,采用复杂网络、处方相似性网络、社团划分等数据挖掘方法,探讨HFpEF的处方用药规律。结果共纳入中医药治疗HFpEF临床研究文献142篇,包含146首处方,涉及中药162味;使用频次较高的中药以黄芪、丹参、茯苓为代表;利用复杂网络分析得到治疗HFpEF的核心处方及常用药物配伍,核心处方由黄芪、茯苓、丹参、甘草、川芎、桂枝、葶苈子、白术、赤芍、麦冬、当归组成;进一步基于处方相似性网络和社团划分方法,得到对应于HFpEF分期及证型的3个主要社团类方集合基础方,发现HFpEF病程发展的分期诊疗用药规律。结论益气活血、温阳利水为HFpEF的治疗大法;采用数据挖掘技术分析HFpEF核心处方及类方,可为HFpEF中医诊疗规律及用药经验总结提供依据。
基金Supported by the Key Special Project of the National Key R&D Program(No.2019YFC1710003 and No.2019YFC1710000)the Key Project of the National Natural Science Foundation of China(No.82030120)。
文摘Objective:To summarize the medication rules of Chinese herbs to treat heart failure with preserved ejection fraction(HFPEF)based on data mining and to provide references for clinical utilization.Methods:The China National Knowledge Infrastructure(CNKI),Wanfang database(Wanfang),VIP database(VIP),Chinese Biomedical Literature(CBM),PubMed,Embase,and Cochrane Library databases were searched from inception to October 2021 to identify relevant literature on treating HFPEF with Chinese herbs.Microsoft Excel 2019 was used to set up a database,and then,association rule analysis and hierarchical cluster analysis were performed by using apriori algorithm and hclust function respectively in R-Studio(Version 4.0.3).Results:A total of 182 qualified papers were included,involving a total of 92 prescriptions,130 Chinese herbs,and 872 individual herbs prescribed,with an average of 9.5 herbs per prescription.The six most frequently prescribed herbs were Astragali Radix(Huangqi),Salviae Miltiorrhizae Radix Et Rhizoma(Danshen),Poria(Fuling),Glycyrrhizae Radix Et Rhizoma(Gancao),Cinnamomi Ramulus(Guizhi),and Ginseng Radix Et Rhizoma(Renshen).There were 35 herbs used more than 5 times,involving 11 efficacy categories.The top three categories were deficiency-tonifying herbs,blood-activating and stasis-removing herbs,and dampnessdraining diuretic herbs.The most commonly used herbs were mainly warm and sweet.The primary meridian tropisms were Lung Meridian,Heart Meridian and Spleen Meridian.Association rule analysis yielded 26 association rules,such as Astragali Radix(Huangqi)&Salviae Miltiorrhizae Radix Et Rhizoma(Danshen),Poria(Fuling),Cinnamomi Ramulus(Guizhi)&Atractylodis Macrocephalae Rhizoma(Baizhu).Hierarchical cluster analysis yielded four herb classes,and their functions were mainly qi-replenishing and yang-warming,bloodactivating and diuresis-inducing.Conclusions:HFPEF is the syndrome of root vacuity and tip repletion,and its core pathogenesis is"deficiency","stasis",and"wafer",with"deficiency"being the most principal,which is closely related to Xin(heart),Fei(Lung),and Pi(Spleen).The treatment of this disease occurs by improving qi,warming yang,activating blood and inducing diuresis.Astragali Radix(Huangqi)with Salviae Miltiorrhizae Radix Et Rhizoma(Danshen)is the basic combination of herbs applied.