学科分类
/ 9
180 个结果
  • 简介:AnIntegratedApproachAnIntegratedApproachOverthepestfewyears,theJilinProvincialGovernment,inaccordancewithitsuniqueconditionsa...

  • 标签:
  • 简介:IntegratedApproachinSichuanTheIntegratedApproachtofamilyplanning,oneoftheinitiativestakenbythepublicandgrassrootsfamilyplanni...

  • 标签:
  • 简介:NationalConferenceonIntegratedApproachAnationalconferenceontheintegratedApproachwasheldfromOctober22to26,1995inChengdu,capita...

  • 标签:
  • 简介:Therecentadvancesontheresearchandtheapplicationsoftheintegratedopticsacousto-opticspectrumanalyzer(IOSA)arereviewed.Theoperatingprinciple,ar-chitecture,characteristicsandtechnology,andfuturedevelopmentofthedifferentre-ceiersaredescribed.

  • 标签: 声光工艺 集成光学 频谱分析仪 IOSA
  • 简介:Ortho_imageswillfullybeintegratedinGIS.Nodoubt,GISforgeneralpurposeisusablewithouttheintegrationofortho_imagesandotherrasterdata.ForsmallGISprojectsitmaybesufficienttostoreinformationassimplefiles.Whendatavolume,however,becomeslargeandthenumberofdatausersbecomesmorethanafew,thedatabasemanagementsystembecomesthemostimportantcomponent.Forinstance,thebasicdesignofGeoStarisbasedontheClient/ServerarchitectureandusinglargeRDBSandOODBStomanagetherasterandvectordatasuchasgraphicdata,attributedata,imagedataandDEMatthesameframework,whichisathoroughandseamlessintegratedsolutionforGISapplications.Thebriefstructureofdatabase,whichisreallyhybridandintegrated,isshowninFig.1.  Inordertoprovidemoreefficientdataaccessorbrowseforalargearea,thevectordataisorganizedaccordingtotheclassifiedspatialindexbasedonanextendedquadtreecodestoredasclusterrelatedtothefeaturesize,asshowninFig.2.TherasterdatalikeimageandDEMisorganizedinpyramidgrid_dedmanner(Fig.3).EspeciallywearefacingtheproblemofmultiscaledatabaseswithindifferentcoordinatesystemsanddifferentmapprojectionsinChina,themoresophisticateddatabasesintegrationmethodthereforehastobedevelopedtodealwiththesocalled“crossingtheprojectionzone'problem.

  • 标签: SPATIAL DATA INFRASTRUCTURE CyberCity INTEGRATED SPATIAL
  • 简介:TheintegratedCivilSocietyOrganizations(iCSO)System,developedbytheDepartmentofEconomicandSocialAffairs(DESA),facilitatesinteractionsbetweencivilsocietyorganizationsandDESA.Thesystemprovides

  • 标签:
  • 简介:为河的水,沉积和许多水质成分典型地从贡献分水岭的高地以及从降低举起的溪流方面地区和河岸被导出。这为内部和平的西北和大盆区域的地形的复杂的风景是特别地明显的,在从高举起的积雪场的雪水是为穿越广泛的半干旱的低地的河的主要的水来源的地方。当硫管理通常集中于下游地高顺序的活动范围时,自然资源经理逐渐地在硫的头水里担心小、低顺序的河系和河边的环境。对理解头水水文学的需要为头水和中间举起的扇区的水疗院逻辑政体亲密地在低举起的、高顺序的流活动范围在被连接到流速及流水量和隧道进程的一个牧场分水岭系统被表明。全面的、成功的河和分水岭管理和模拟模型申请要求足够地理解的水疗院逻辑和来源分水岭的生态系统特征。

  • 标签: Water quality Watershed RIVER BASIN management
  • 简介:KLOEisacquiringandanalyzinghundredsofterabytesofdata,storedastensofmillonsoffiles,Inordertosimplifytheaccesstothesedata,aURI-basedmechanismhasbeenputinplase,TheKIDpackageisanimplementationofthatmechanismandispresentedinthispaper.

  • 标签: 数据处理 KLOE实验 CP破坏参数
  • 简介:Withthedevelopmentoftheelectroniccommerce,theelectronicword-of-mouth(eWOM)hasbecomeimportantreferenceinformationforconsumershopping.EWOMhasattractedconsiderableinterestfromresearchersinthepastdecade.Inthispaper,aresearchreviewisconductedandanintegratedframeworkisproposedontheeffectofeWOM.TheeffectofeWOMareinfluencedbyitscharacteristics,communicators,andotherfactors.ThecharacteristicsofeWOMincludethesource,thevolumeandthevalence.ThecommunicatorsofeWOMrefertothesender,thereceiverandtherelationshipbetweenthem.Inaddition,dispersionandconsistency,persistenceandobservability,anonymityanddeception,andcommunityengagementarerelatedfactorsfortheeffectofeWOM.

  • 标签:
  • 简介:Incharacterizingthesemistablelaw,ShimizureducedtheproblemtosolvingtheequationH(x)=integralfromn=1to∞(H(x+y)d(μ-ν)(y),x≥0)whereμandτaregivenpositivemeasureson[0,∞).Inthisnote,weobtainasimpleproofandshowthatsomeofhisconditionscanbeweakened.

  • 标签: Shimizu PROOF characterizing weakened 主桩 adding
  • 简介:在这篇论文,我们直接证明乘综合的组的伪-定义代数学同形。我们也乘综合的组给在光滑的分发组和伪-之间的等价的一条定理。关键词综合的组-分发组-Weyl部分演算先生(2000)题目分类47D62-26A33部分由西班牙的工程MTM2004-03036,MCYTDGI鈥揊EDER和DGA支持了工程鈥淎n谩lisisMatem谩ticoyAplicaciones鈥?E-12/25

  • 标签: 完整群 分布群 Weyl部分微积分学 群论 光滑性
  • 简介:Dataclusteringisasignificantinformationretrievaltechniqueintoday’sdataintensivesociety.Overthelastfewdecadesavastvarietyofhugenumberofdataclusteringalgorithmshavebeendesignedandimplementedforallmostalldatatypes.Thequalityofresultsofclusteranalysismainlydependsontheclusteringalgorithmusedintheanalysis.Architectureofaversatile,lessuserdependent,dynamicandscalabledataclusteringmachineispresented.Themachineselectsforanalysis,thebestavailabledataclusteringalgorithmonthebasisofthecredentialsofthedataandpreviouslyuseddomainknowledge.Thedomainknowledgeisupdatedoncompletionofeachsessionofdataanalysis.

  • 标签: 数据聚类 建筑机械 聚类算法 知识更新 检索技术 数据类型
  • 简介:ThecurrentdemandofFPTUniversityishowtodevelopprogramlearningoutcomes(LOs)respondingtoindustryrequirements,aswellastodesigntheintegratedcurriculumthatprovidesnotonlyknowledgebutalsopersonalattributesandprofessionalskillsforstudents.Since2016,FPTUniversityhasbeenresearchingandapplyingconceiving,designing,implementing,andoperating(CDIO)basicallyandsystematicallyindesigningandrenovatingprograms.Intherangeofthispaper,theauthorwilldescribethecurriculumdesignprocessforbothpublicrelations(PRs)programandE-commerceprogram.TheoutputsincludeprogramLOs,sequenceofskills,andintegratedcurricula.Next,thearticlesharesaboutthecollaborationwithindustriestodesigntheintroductorycoursesintwoselectedprograms.Finally,thearticleprovidestheinformationoffacultydevelopmentprogramstoimplementCDIOteachingandlearningactivitiesduringthepastyears.

  • 标签: conceiving DESIGNING IMPLEMENTING and operating(CDIO) learning
  • 简介:WegiveanintroductionforthebackgroundandmotivationoftheIntegratedPhotonics:ChallengesandPerspectivesfeature.Averybriefsummaryforthefiveinvitedreviewarticlescollectedinthisfeatureissueisalsogiven.

  • 标签:
  • 简介:知识产权(IP)保护是在硬件安全的顶级问题之一。半导体工业仍然缺乏有效、积极的防卫从基于的工程(RE)攻击的颠倒防护IP。集成电路(IC)camouflaging技术由没有改变IP的功能,用特殊设计的逻辑房间(叫的camouflaged门)在IP代替一些常规逻辑门充满这差距。当维持相同的看到RE攻击者时,camouflaged门能执行不同逻辑功能,因此阻止他们从RE工具直接获得IP的布局信息。因为它首先在2012被建议,电路camouflaging在硬件安全集中于二个基本问题成为了最热的研究话题之一。怎么选择camouflaged门的类型并且决定在哪儿插入他们以便同时最小化性能开销并且优化RE复杂性?怎么装攻击者de伪装一个camouflaged电路并且完成RE攻击?在这篇文章,我们通过这根矛和盾种族考察电路camouflaging的进化。首先,我们基于true/dummy接触介绍camouflaged房间的四种不同类型的设计方法,静态的随机的存取记忆(静态存储器),做,并且新兴的设备分别地。然后,我们详细描述四代表性的伪装de攻击:蛮力攻击,测试的IC基于攻击,基于可满足性(坐基于)攻击,和电路分区基于攻击,和相应反措施:基于派系的camouflaging,CamoPerturb,并且树camouflaging,和相等的班分别地基于camouflaging。我们主张当前的研究努力应该在减少电路camouflaging介绍的开销并且打败伪装de攻击上。我们指出探索新兴的设备的特征能是一个有希望的方向。作为到电路camouflaging的补充,最后,我们与另外的最先进的IP保护技术的简短评论得出结论。

  • 标签: 集成电路 进化 静态存储器 保护技术 攻击者 硬件安全