期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
可抽取能量的避雷线 被引量:2
1
作者 刘炳尧 肖松兰 刘持夫 《现代节能》 1990年第2期42-45,共4页
绝缘避雷线不仅可减少高压线路环流引起的电能损失,节约电能,而且可综合利用,具有较大的经济效益和社会效益。文中深入讨论了抽取电能的条件,用模拟试验结果进行了论证。简单介绍了已研制出的5KVA变压器抽能装置。结论中指出了值得参考... 绝缘避雷线不仅可减少高压线路环流引起的电能损失,节约电能,而且可综合利用,具有较大的经济效益和社会效益。文中深入讨论了抽取电能的条件,用模拟试验结果进行了论证。简单介绍了已研制出的5KVA变压器抽能装置。结论中指出了值得参考的几点意见。 展开更多
关键词 能量 可抽取 壁雷线
原文传递
光纤式微量水分析仪的应用 被引量:1
2
作者 李菲 童方君 《石油化工自动化》 CAS 2017年第5期64-66,共3页
微量水分在线测量广泛存在于石油化工行业,用于优化生产工艺和监控安全。通过与传统微量水分析仪的对比,介绍了光纤式微量水分析仪的测量原理及优势。结合烯烃精制工况,对比传统单通道、采样预处理的系统配置和多通道、可抽取安装的光... 微量水分在线测量广泛存在于石油化工行业,用于优化生产工艺和监控安全。通过与传统微量水分析仪的对比,介绍了光纤式微量水分析仪的测量原理及优势。结合烯烃精制工况,对比传统单通道、采样预处理的系统配置和多通道、可抽取安装的光纤法系统配置,验证了光纤法在工程应用中的优势,并详细阐述了实际工程应用中的注意事项。 展开更多
关键词 微量水分析仪 光纤式 多通道 可抽取组件
下载PDF
On the role of optimization algorithms in ownership-preserving data mining 被引量:1
3
作者 Muhammad KAMRAN Ehsan Ullah MUNIR 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第2期151-164,共14页
Knowledge extraction from sensitive data often needs collaborative work. Statistical databases are generated from such data and shared among various stakeholders. In this context, the ownership protection of shared da... Knowledge extraction from sensitive data often needs collaborative work. Statistical databases are generated from such data and shared among various stakeholders. In this context, the ownership protection of shared data becomes important. Watermarking is emerging to be a very effective tool for imposing ownership rights on various digital data formats. Watermarking of such datasets may bring distortions in the data. Consequently, the extracted knowledge may be inaccurate. These distortions are controlled by the usability constraints, which in turn limit the available bandwidth for watermarking. Large bandwidth ensures robustness; however, it may degrade the quality of the data. Such a situation can be resolved by optimizing the available bandwidth subject to the usability constraints. Optimization techniques, particularly bioinspired techniques, have become a preferred choice for solving such issues during the past few years. In this paper, we investigate the usability of various optimization schemes for identifying the maximum available bandwidth to achieve two objectives:(1) preserving the knowledge stored in the data;(2) maximizing the available bandwidth subject to the usability constraints to achieve maximum robustness. The first objective is achieved with a usability constraint model, which ensures that the knowledge is not compromised as a result of watermark embedding. The second objective is achieved by finding the maximum bandwidth subject to the usability constraints specified in the first objective. The performance of optimization schemes is evaluated using different metrics. 展开更多
关键词 Information security Optimization Digital fights WATERMARKING
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部