Planning of commercial outlets bears great significance to all-round development of small-and mediumscaled cities and has been put to priority of promoting regional economic sustainable development. In combination of ...
详细信息
ISBN:
(纸本)9781424445196
Planning of commercial outlets bears great significance to all-round development of small-and mediumscaled cities and has been put to priority of promoting regional economic sustainable development. In combination of actual situation of Yihuang County, this Article has herein explored the major problems existed in the current layout of commercial outlets of small-and medium-scaled cities in our country, and put forwards that the key of efficient planning is to arrange the layout appropriately, improve modern logistics system, enhance the magnitude of business and capital invitation to develop local specialized economy. & copy;2009ieee.
Spatial data mining is to extract implicit knowledge, spatial relations as well as other non-explicitly information which included in the spatial database but it exist with other model from the spatial database. Due t...
详细信息
ISBN:
(纸本)9781424445189
Spatial data mining is to extract implicit knowledge, spatial relations as well as other non-explicitly information which included in the spatial database but it exist with other model from the spatial database. Due to the complexity of spatial data and its application of the professional, and it gives challenges to spatial data mining. In the paper, the characteristics of spatial datum were analyzed, and the distinctions were presented between spatial data and the traditional relationship data, the traditional data mining processes and architecture were Analyzed and improved, A new process and architecture were presented for spatial datum data mining based on data warehouse, On the basis of the work, we design a prototype system for data mining of the spatial datum, We resolved and implemented the synergetic work in ingenious between the layers of the prototype system and between the components in the layer by the four-tier of J2EE architecture, Also, an implementation method was presented for the key technology.
Along with the emergence of WWW, JAVA and XML, etc, the network management system based on JAVA has become a hot issue in present research and it put forward realization methods of some corresponding technologies, suc...
详细信息
ISBN:
(纸本)9781424445189
Along with the emergence of WWW, JAVA and XML, etc, the network management system based on JAVA has become a hot issue in present research and it put forward realization methods of some corresponding technologies, such as network topology search discovery and topology reconfiguration based on SNMP protocol (routing table), ARP protocol and ICMP protocol, access processing of SNMP, information structure of MIB and acquisition of information based on MIB, search and real-time functions of application server and network service monitoring, etc.
The applications of "5S"technology in the agricultural research that accelerated to the development of precision agriculture and modern agriculture. In the conditions of mountain diversity topography and com...
详细信息
Regarding to the fast growth of computer, internet, and virtual learning in our country (Iran) and need computer-based learning systems and multimedia tools as an essential part of such education, designing and implem...
详细信息
ISBN:
(纸本)9781424445189
Regarding to the fast growth of computer, internet, and virtual learning in our country (Iran) and need computer-based learning systems and multimedia tools as an essential part of such education, designing and implementing such systems would help teach different field. This paper describes the basic principle of multimedia. At the end, with a description of learning driving system to learner, the method of this system will be explained.
Aimed at the image locating problem with shielding case, this paper analysis the shortage of general pattern match algorithm then present a fast subpixel locating algorithm based on characteristic edges detect of shie...
详细信息
ISBN:
(纸本)9781424445189
Aimed at the image locating problem with shielding case, this paper analysis the shortage of general pattern match algorithm then present a fast subpixel locating algorithm based on characteristic edges detect of shielding case. First, it uses binarization and blob analysis method to remove the small particles;Next, it performs a Laplacian transform to get the edge image;And then finds the line segment sets and filter with the size information of the case to get the characteristic edges;And then use Zernike orthogonal moment to get subpixel edges;Finally deduces the center and rotate angle with the characteristic edges. The result shows the locating speed and the accuracy of the algorithm is well and meets the practical application. The algorithm also has strong robust.
This paper investigated the feasibility to design and fabricate a sacrificial pattern for a removable partial denture (RPD)metal alloy framework with computer-aided design (CAD) and rapid prototyping (RP) technologies...
详细信息
ISBN:
(纸本)9781424445189
This paper investigated the feasibility to design and fabricate a sacrificial pattern for a removable partial denture (RPD)metal alloy framework with computer-aided design (CAD) and rapid prototyping (RP) technologies. A plaster cast of a patient was digitally scanned with an optical scanner and the captured surface data were imported to three-dimensional (3D) softwares, which were then used to preprocess the data and design each composent of RPD framework with reference to the scanned digital model. After boolean operation,the digital model of framework was created and the data were saved as standard triangulation language (STL) format for producing a sacrificial pattern of framework with RP technology. Then the casting mold method was carried out in a chromium-cobalt alloy to manufacture a RPD entity framework according to the pattern. The result has indicated that the fabricated RPD framework was fit to the patient successfully and could be acceptable for clinical presentation.
Our research aims at building a specific document retrieval system using for searching eBooks in elibraries. This model has some characteristics: processingqueries in English, interacting with users and the users can ...
详细信息
The configuration of Struts, spring, hibernate contribute to building a Web information system, but they have their respective benefits and drawbacks. Based on the research of Struts, Hibernate and spring integration,...
详细信息
ISBN:
(纸本)9781424445189
The configuration of Struts, spring, hibernate contribute to building a Web information system, but they have their respective benefits and drawbacks. Based on the research of Struts, Hibernate and spring integration, a new method in web development is presented. That is while using struts developed view layer, spring developed business logic layer, Hibernate is used to configure endurance layer, so that they complement each other, forming an integrated configuration. This article dissert the structure of the integration of these three principles and methods and Ground tilt earthquake precursor system Based on Struts + Spring + Hibernate, to illustrate the use of the integrated configuration to develop a powerful and flexible tilt earthquake Precursor of the high-performance systems approach.
The information source has been a bottleneck problem which troubles the vehicle digitalization process for a long time. With the rapid growth and wide range of adoption of Radio Frequency Identification (RFID for shor...
详细信息
ISBN:
(纸本)9781424445189
The information source has been a bottleneck problem which troubles the vehicle digitalization process for a long time. With the rapid growth and wide range of adoption of Radio Frequency Identification (RFID for short) technology provide a new viable solution for the problem. However, with the adoption of RFID technology, the information security problems must be solved. This paper discussed the characteristics and peculiarity of RFID technology as vehicle digital standard info-source (VDSI for short), and proposed a security information exchange protocol algorithm based on Elliptic Curve Cryptography (ECC for short).
暂无评论