期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
一种基于铁精矿采选精益成本六环六控数字化管控方法
1
作者 杨奇 尹丽琼 邝昌云 《昆钢科技》 2022年第4期57-58,共2页
在新一轮科技工业革命中,为推进矿山企业降本提质增效高质量发展,查找制约企业发展的短板与瓶颈,以铁精矿采选生产工序细分和成本管控为切入点,将采矿工序细分为“掘、爆、铲、运、溜、提”,选矿工序细分为“碎、磨、选、检、排、堆”... 在新一轮科技工业革命中,为推进矿山企业降本提质增效高质量发展,查找制约企业发展的短板与瓶颈,以铁精矿采选生产工序细分和成本管控为切入点,将采矿工序细分为“掘、爆、铲、运、溜、提”,选矿工序细分为“碎、磨、选、检、排、堆”六个环节,对其生产相关数据如设备信息进行采集,对班报日报等信息进行数字化填报、审批、锁定,确保采选数据的完整性、及时性和准确性,以数据驱动采选成本精益管控,提高企业核心竞争力。 展开更多
关键词 六环六控 采选数据 数字化 数据驱动 精益成本 生产数据
下载PDF
Feature selection based on mutual information and redundancy-synergy coefficient 被引量:7
2
作者 杨胜 顾钧 《Journal of Zhejiang University Science》 EI CSCD 2004年第11期1382-1391,共10页
Mutual information is an important information measure for feature subset. In this paper, a hashing mechanism is proposed to calculate the mutual information on the feature subset. Redundancy-synergy coefficient, a no... Mutual information is an important information measure for feature subset. In this paper, a hashing mechanism is proposed to calculate the mutual information on the feature subset. Redundancy-synergy coefficient, a novel redundancy and synergy measure of features to express the class feature, is defined by mutual information. The information maximization rule was applied to derive the heuristic feature subset selection method based on mutual information and redundancy-synergy coefficient. Our experiment results showed the good performance of the new feature selection method. 展开更多
关键词 Mutual information Feature selection Machine learning Data mining
下载PDF
Towards a respondent-preferred k_i-anonymity model
3
作者 Kok-Seng WONG Myung Ho KIM 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2015年第9期720-731,共12页
Recently, privacy concerns about data collection have received an increasing amount of attention. In data collection process, a data collector (an agency) assumed that all respondents would be comfortable with submi... Recently, privacy concerns about data collection have received an increasing amount of attention. In data collection process, a data collector (an agency) assumed that all respondents would be comfortable with submitting their data if the published data was anonymous. We believe that this assumption is not realistic because the increase in privacy concerns causes some re- spondents to refuse participation or to submit inaccurate data to such agencies. If respondents submit inaccurate data, then the usefulness of the results from analysis of the collected data cannot be guaranteed. Furthermore, we note that the level of anonymity (i.e., k-anonymity) guaranteed by an agency cannot be verified by respondents since they generally do not have access to all of the data that is released. Therefore, we introduce the notion of ki-anonymity, where ki is the level of anonymity preferred by each respondent i. Instead of placing full trust in an agency, our solution increases respondent confidence by allowing each to decide the preferred level of protection. As such, our protocol ensures that respondents achieve their preferred kranonymity during data collection and guarantees that the collected records are genuine and useful for data analysis. 展开更多
关键词 Anonymous data collection Respondent-preferred privacy protection K-ANONYMITY
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部