期刊文献+
共找到1,057篇文章
< 1 2 53 >
每页显示 20 50 100
GIS as an Information Infrastructure for Recovery and Reconstruction after the Great East Japan Earthquake 被引量:1
1
作者 Kayoko Yamamoto 《Journal of Earth Science and Engineering》 2012年第8期461-471,共11页
This study considers the regional characteristics of the Tohoku region and the extent of the damage caused by the Great East Japan Earthquake and makes proposals for recovery and reconstruction of the areas affected b... This study considers the regional characteristics of the Tohoku region and the extent of the damage caused by the Great East Japan Earthquake and makes proposals for recovery and reconstruction of the areas affected by this disaster as well as for a reduction of the impact of natural disasters that may occur in the future with GIS (geographic information systems) as a social infrastructure positioned at the heart of the information infrastructure. Due to the fact that social media that used ICT (information and communication technology) was useful in the days directly after the disaster, it can be said that it is necessary to investigate the provision of an information infrastructure that uses ICT to reduce the impact of disasters. Therefore, this study proposes the construction of a geographical information database using GIS and the provision and sharing of information using social media GIS after discussion of the relationship between the development of the computerization of Japan and GIS as a valid example of using information systems for recovery and reconstruction after the Great East Japan Earthquake. 展开更多
关键词 GIS (Geographic information Systems) information infrastructure ICT information and communication technology) recovery and reconstruction Great East Japan Earthquake.
下载PDF
The Development of Intelligent Operation Method of Urban Public Infrastructure Driven by Accurate Spatio-temporal Information 被引量:5
2
作者 Jingyuan JIA Bo WANG 《Journal of Geodesy and Geoinformation Science》 2021年第2期27-35,共9页
Urban public infrastructure is an important basis for urban development.It is of great significance to deepen the research on intelligent management and control of urban public infrastructure.Spatio-temporal informati... Urban public infrastructure is an important basis for urban development.It is of great significance to deepen the research on intelligent management and control of urban public infrastructure.Spatio-temporal information contains the law of state evolution of urban public infrastructure,which is the information base of intelligent control of infrastructure.Due to the needs of operation management and emergency response,efficient sharing and visualization of spatio-temporal information are important research contents of comprehensive management and control of urban public infrastructure.On the basis of summarizing the theoretical research and application in recent years,the basic methods and current situation of the acquisition and analysis of spatio-temporal information,the forecast and early warning,and the intelligent control of urban public infrastructure are reviewed in this paper. 展开更多
关键词 urban public infrastructure satellite navigation system spatio-temporal information forecast and early warning intelligent control
下载PDF
The Relation of Department Components and Activity in Spatial Information Infrastructure
3
作者 Yi Shan zhen 1, Zhou Li zhu 1,Cheng Ji cheng 2, Li Qi 2 1.Department of Computer Science and Technology,Tsinghua University, Beijing 100084, China 2.Institute of Remote Sensing and Geographical Information System,Peking University,Beijing 1008 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期460-466,共7页
Spatial Information Infrastructure (SII) facilitates the sharing, interoperability and integration of geographical information among department components of a region or a country. The SII is developed and shared by d... Spatial Information Infrastructure (SII) facilitates the sharing, interoperability and integration of geographical information among department components of a region or a country. The SII is developed and shared by different department components. The relation of department components is a fundament for collaborating tasks and information exchange in SII. There are two kinds of department components, one is the provider which produces geospatial data of SII, other is the consumer which uses geospatial data of SII. The consumer includes two kinds of user, one is the user which only uses and does not produce geospatial data in SII, other is the special user which not only uses but also produces geospatial data in SII. The provider includes different hierarchies corresponding to different kinds of geospatial data in SII. All providers in the hierarchies form provider actor set PA. All consumers also form consumer actor set CA. The sender recipient relation SR and SRI are defined on Cartesian product of PA and CA. Five tasks and information flow in SII demonstrate the geospatial data acquisition, information production, management, and application among department components. The tasks and their sub tasks are subdivided activities. Each activity corresponds to the relation SR or RSI. The activity along with the relation of provider and consumer forms a scheme of geographical information exchange between department components. 展开更多
关键词 geographical information EXCHANGE RELATION ACTIVITY information infrastructure
下载PDF
Information and Communication Services for Business Processes in CIM Integrating Infrastructure
4
作者 綦建平 王刚 +1 位作者 徐晓飞 姚万生 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1996年第1期99-102,共4页
A plan of information and communication services in the HIT-IIS, a prototype system of CIM integrating infrastructure is introduced. These two classes of services provide the basic information supporting platform for ... A plan of information and communication services in the HIT-IIS, a prototype system of CIM integrating infrastructure is introduced. These two classes of services provide the basic information supporting platform for CIM system and CIM integrating infrastructure, based on the distributed database syestem and computer network system. The structure, organization and workflow of these services are given. 展开更多
关键词 ss: COMPUTER integrated manufacturing(CIM) CIM integrating infrastructure information technology information integration
下载PDF
Production of High-Resolution Remote Sensing Images for Navigation Information Infrastructures
5
作者 WANGZhijun DjemelZiou CostasArmenakis 《Geo-Spatial Information Science》 2004年第2期129-134,共6页
This paper introduces the image fusion approach of multi-resolutionanalysis-based intensity modulation (MRAIM) to produce the high-resolution multi-spectral imagesfrom high-resolution panchromatic image and low-resolu... This paper introduces the image fusion approach of multi-resolutionanalysis-based intensity modulation (MRAIM) to produce the high-resolution multi-spectral imagesfrom high-resolution panchromatic image and low-resolution multi-spectral images for navigationinformation infrastructure. The mathematical model of image fusion is derived according to theprinciple of remote sensing image formation. It shows that the pixel values of a high-resolutionmulti-spectral images are determined by the pixel values of the approximation of a high-resolutionpanchromatic image at the resolution level of low-resolution multi-spectral images, and in the pixelvalae computation the M-band wavelet theory and the a trous algorithm are then used. In order toevaluate the MRAIM approach, an experiment has been carried out on the basis of the IKONOS 1 mpanchromatic image and 4 m multi-spectral images. The result demonstrates that MRAIM image fusionapproach gives promising fusion results and it can be used to produce the high-resolution remotesensing images required for navigation information infrastructures. 展开更多
关键词 image fusion MRAIM algorithm navigation information infrastructure
下载PDF
Improving Information Technology Infrastructure Library Service Delivery Using an Integrated Lean Six Sigma Framework: A Case Study in a Software Application Support Scenario
6
作者 Anil Kumar Raghavan Pillai Ashok Kumar Pundir L. Ganapathy 《Journal of Software Engineering and Applications》 2014年第6期483-497,共15页
Increasing competition in service businesses (eg: Information Technology, Healthcare, Education, Logistics, Distribution, Hospitality Financial and other services) is compelling corporates to adopt business improvemen... Increasing competition in service businesses (eg: Information Technology, Healthcare, Education, Logistics, Distribution, Hospitality Financial and other services) is compelling corporates to adopt business improvement philosophies and methodologies for addressing customer demands for better quality service and organizational demands for improving the profit margins through cost reduction. Many companies around the world have already implemented Information Technology Infrastructure Library (ITIL) as a way to manage and control their Information Technology (IT) Departments more effectively. These companies are now willing to improve their ITIL processes in order to become even more efficient. Lean Six Sigma is a methodology that has been suggested as a means to resolve these problems, reducing costs and improving quality. Its application in the IT Services area is becoming increasingly popular among researchers and academicians and can be used to conduct these improvements. Despite the application of lean six sigma approaches to different contexts in the service sector, the application of Lean Six Sigma approaches in service delivery specific to Information Technology Service Management (ITSM) remains largely untested. The purpose of this paper is to implement Integrated Lean Six Sigma for Software application support services and evaluate the benefits of continual service improvement over ITIL. 展开更多
关键词 information Technology infrastructure LIBRARY Change MANAGEMENT Configuration MANAGEMENT Software Application SUPPORT LEAN Six SIGMA
下载PDF
International Telecommunication Union Standardization for Trust Provisioning in Information, Communication and Technology Infrastructure toward Achieving United Nation’s Sustainable Development Goals
7
作者 Maryam Roshanaei Qiang Duan 《Journal of Computer and Communications》 2021年第10期44-59,共16页
The advancement of the fourth industrial revolution has shaped the integration and interaction of different information, communication and technologies (ICTs) in the merging cyber, physical, and social infrastructures... The advancement of the fourth industrial revolution has shaped the integration and interaction of different information, communication and technologies (ICTs) in the merging cyber, physical, and social infrastructures. The impact of ICT has accelerated the progress of the United Nation’s Sustainable Development Goals (UN SDGs) and influenced the evolution of smart, sustainable, stable society development. Making the trustworthy information and communication technologies infrastructure widely available will promote the community innovation needed to stimulate domestic economics, provide decent work, and reduce inequalities. This article attempts to outline a big picture about the International Telecommunication Union (ITU)’s trust provisioning framework, including its motivation, current status, and application for achieving the UN SDGs by 2030. This article first describes the purpose of the UN SDGs and the evolution of the industrial revolution, then demonstrates the challenges of global risks affecting the fourth industrial revolution and the need for trustworthy ICT infrastructures. Subsequently, the article evaluates the ITU trust provisioning framework and assesses its applications in the future knowledge society, trust provisioning ecosystem, and cyber, physical, and social infrastructure toward achieving UN SDGs. Use cases are also presented in this article to show the effectiveness of the ITU trust provisioning framework on achieving UN SDGs. 展开更多
关键词 Trust Provisioning Fourth Industrial Revolution information Communication and Technologies Sustainable Development Goals Global Risks Cyber Physical and Social infrastructure
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
8
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 Cloud Computing information Security Cloud infrastructure Offerings Cloud Migration Security Measures Data Breaches Cloud Service Providers CYBERSECURITY Cloud Security Case Studies Cloud Threat Landscape Data Encryption COMPLIANCE Cloud Security Tools
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
9
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Developments of spatial information-based Digital Mine in China 被引量:3
10
作者 吴立新 车德福 《Journal of Coal Science & Engineering(China)》 2008年第3期415-419,共5页
Gave a brief introduction to the origin,concepted and hierarchical structure of Digital Mine.As a huge complex system,Digital Mine took data base and model base to- gether as a mine data management system being its co... Gave a brief introduction to the origin,concepted and hierarchical structure of Digital Mine.As a huge complex system,Digital Mine took data base and model base to- gether as a mine data management system being its core,and Digital Mine was com- prised of five subsystems including data obtaining system,integral dispatching system, applied engineering system,data processing system,and data management system.Be- ing a digitally 3D visualized representation and a spatial information infrastructure of an actual mine,Digital Mine had three basic features such as data warehouse,information reference and digital platform.The present developments of Digital Mine in mining industry, research and education were also introduced.Examples were shown for present Digital Mine construction in China.The development trends,the key technologies and the recent construction procedures on Digital Mine were presented. 展开更多
关键词 Digital Mine spatial information infrastructure 3D geosciences modeling mine geo-information system digital 3D-platform
下载PDF
Management Agility Depends on Well-Renovated IT Infrastructure 被引量:1
11
作者 Masaru Furukawa Akira Minami 《Computer Technology and Application》 2012年第8期564-577,共14页
Today management agility as an inter-corporate competitive advantage cannot be realized unless given all of the following quickness: (a) quick recognition of changes in the management environment, (b) quick decis... Today management agility as an inter-corporate competitive advantage cannot be realized unless given all of the following quickness: (a) quick recognition of changes in the management environment, (b) quick decision-making on countermeasures against these changes, and (c) quick implementation of the countermeasures chosen. With a focus on (c) and assuming flexibility as a core property that an MIS (Management Information System) should have to make management agile, this study aims to clarify how MIS flexibility could be enhanced. With this aim in mind, the authors will first survey the sources and types of change demands on an MIS and consider in a structured way the flexibility characteristics of an MIS, enhancement of which will conduce to its efficiency in dealing with these change demands. With this groundwork laid, the authors will go on to discuss practical methods to enhance MIS flexibility, and wind up their discussion by presenting the evaluation procedure for this property. 展开更多
关键词 IT information technology) infrastructure MIS (management information system) flexibility MIS evaluation penalty of change.
下载PDF
Analysis of Causes and Actual Events on Electric Power Infrastructure Impacted by Cyber Attack
12
作者 Hongxu Yin Rui Xiao Fenfei Lv 《Journal of Power and Energy Engineering》 2015年第4期77-84,共8页
With the development of electric power technology, information technology and military technology, the impact of cyber attack on electric power infrastructure has increasingly become a hot spot issue which calls both ... With the development of electric power technology, information technology and military technology, the impact of cyber attack on electric power infrastructure has increasingly become a hot spot issue which calls both domestic and foreign attention. First, main reasons of the impact on power infrastructure caused by cyber attack are analyzed from the following two aspects: 1) The dependence of electric power infrastructure on information infrastructure makes cyber attack issues in information field likely to affect electric power field. 2) As regards to the potential threat sources, it will be considerably profitable to launch cyber attacks on electric power infrastructure. On this basis, this paper gives a classified elaboration on the characteristics and the possibilities of cyber attacks on electrical infrastructures. Finally, the recently published actual events of cyber attacks in respect of threat sources, vulnerabilities and assaulting modes are analyzed and summarized. 展开更多
关键词 CYBER ATTACK Electric Power infrastructure information infrastructure DEPENDENCE
下载PDF
3D Spatial Information Intended for SDI: A Literature Review, Problem and Evaluation
13
作者 Mehrdad Jafari Salim 《Journal of Geographic Information System》 2017年第5期535-545,共11页
In this paper, first we are going to discuss briefly the importance of 3D information, and its application because of the Increasing demand for detailed information about real world objects and phenomena including alt... In this paper, first we are going to discuss briefly the importance of 3D information, and its application because of the Increasing demand for detailed information about real world objects and phenomena including altimetry and planimetry data (X, Y, Z), then we will explain in short the available methods for 3D measurement. It’s important to note that the Information collection by itself cannot define and sufficiently provide all the necessary actions to be taken in order to get them accessible and useful for users. The data management and establishment of a proper and reliable DBMS and finally a GIS system at the same time are vital crucial in the course of 3D application that will be discussed throughout the paper. The existing drawbacks and elements needed to be considered for the cartographic presentation are the key issues in three-dimensional world visualization. The elaboration on the 3D information and its knowledge transfer to the users in a SDI framework as well as the requirement recognition of beneficiary organizations will be the next step in this paper and the most probable problems will be studied in this stage. At the final stage, we’ll come up with conclusion, warnings and recommendation. 展开更多
关键词 3D GEOGRAPHIC information System Spatial Data infrastructure Digital ELEVATION Model VISUALIZATION
下载PDF
Factors Influencing the Successful Adoption of Human Resource Information System: The Content of Aqaba Special Economic Zone Authority
14
作者 Hisham Al-Mobaideen Sattam Allahawiah Eman Basioni 《Intelligent Information Management》 2013年第1期1-9,共9页
This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the p... This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the purpose of the study four critical factors are inquired. So, four critical factors are inquired: First, TAM Model (Perceived Ease of Use (PEOU) and Perceived Usefulness (PU)). Second, Information Technology Infrastructure (ITI). Third, Top Management Support (TMS). Finally, Individual Experience with Computer (IEC). The research model was applied to collect data from the questionnaires answered by 45 users of HRIS as a source of primary data, based on a convenience sample the response rate was about 91%. In addition, the results were analyzed by utilizing the Statistical Package for Social Software (SPSS). Furthermore, the findings were analyzed;multiple Regression analysis indicated that all research variables have significant relationship on successful adoption of HRIS. The findings indicated IT infrastructures have a positive and significant effect on the successful adoption of HRIS. But there is no significant of PU, PEOU, TMS, and IEC on the successful adoption of HRIS. Finally, the results indicated that no significant statistical differences of demographic characteristics on HRIS adoption. Depending on the research’s findings;the researchers proposed a set of recommendations for better adoption of HRIS in SEZA. 展开更多
关键词 Human Resource information System (HRIS) Aqaba Special Economic Zone AUTHORITY (ASEZA) PERCEIVED USEFULNESS (PU) information Technology infrastructure (ITI) Top Management Support (TMS) and Individual Experience with Computer (IEC)
下载PDF
Public Infrastructure Asset Assessment with Limited Data
15
作者 Frederick Bloetscher Lloyd Wander +1 位作者 Greg Smith Nihat Dogon 《Open Journal of Civil Engineering》 2017年第3期468-487,共20页
When creating an asset management plan, missing data is perceived to be a huge problem, especially when the event data (breaks in water distribution pipes as an example) are not tracked. The lack of tracking makes it ... When creating an asset management plan, missing data is perceived to be a huge problem, especially when the event data (breaks in water distribution pipes as an example) are not tracked. The lack of tracking makes it difficult to determine which factors are the critical ones. Many utilities lack the resources for examining buried infrastructure, so other methods of data collection are needed. The concept for this paper was to develop a means to acquire data on the assets for a condition assessment (buried pipe is not visible and in most cases, cannot really be assessed). What was found was that for buried infrastructure, much more information was known than anticipated. Knowing exact information is not really necessary. However, there was a need to track event-breaks, flooding etc.—what would indicate a “failure”.?The latter would be useful for predicting future maintenance needs and the most at-risk assets. 展开更多
关键词 BAYESIAN information THEORY ASSET UNCERTAINTY infrastructure
下载PDF
Critical Energy Infrastructure: Cyberterrorism Threats and Means of Protection
16
作者 V. A. Vasenin 《Journal of Software Engineering and Applications》 2013年第9期23-33,共11页
The present paper is concerned with potential cyberterrorist threats which the objects of national energy infrastructure may undergo, directions of development of counteraction means for these threats, problems arisin... The present paper is concerned with potential cyberterrorist threats which the objects of national energy infrastructure may undergo, directions of development of counteraction means for these threats, problems arising during this development and their possible solutions. This problem field is studied by the author from scientific point of view (from point of view of computer science and information security of large systems) and this paper reflects results of such studies. Many special technical terms were omitted or substituted in order to make the statement accessible to wider range of people concerned. 展开更多
关键词 Energy infrastructure CYBERTERRORISM Threats VULNERABILITIES Critically Important information Security
下载PDF
Resilience at the Core: Critical Infrastructure Protection Challenges, Priorities and Cybersecurity Assessment Strategies
17
作者 Maryam Roshanaei 《Journal of Computer and Communications》 2021年第8期80-102,共23页
The importance of a nation’s infrastructure is a vital core for economic growth, development, and innovation. Health, wealth, access to education, public safety, and helping prepare for global crises like pandemics a... The importance of a nation’s infrastructure is a vital core for economic growth, development, and innovation. Health, wealth, access to education, public safety, and helping prepare for global crises like pandemics are all dependent on functioning and reliable infrastructures. In decades, the substantial threats affecting infrastructures globally whether in the form of extreme weather, Covid-19 pandemic, or the threats of state and non-state actors’ hackers, demanded urgency in building resilience infrastructures both during crises and in more stable conditions. At the same time, the adoption of emerging and innovative technologies boosts the development of the infrastructures using information, communication, and technology (ICT) platform. This shift accelerated its evolution toward digitization where interdependent and interconnected cyberspace demands collaborative and holistic strategies in protecting critical and high risks infrastructure assets from a growing number of disruptive cyberattacks. These ever-evolving cyber threats are creating increasingly dangerous and targeted cyberattacks to damage or disrupt the critical infrastructures delivering vital services to government, energy, healthcare, transportation, telecommunication, and other critical sectors. The infrastructure’s high risks assets present serious challenges and are crucial to safety, efficiency, and reliability. Any nation must recognize and determine how to cope with any type of threats to their critical infrastructure as well as the strategies to remain resilient. This article first describes the challenges and the need for critical infrastructure protection including the related global risks challenges. It then reviews the United Nations, the European Union, and the United States’ strategies, priorities, and urgencies of critical infrastructure protection. Subsequently, it surveys the critical infrastructure protection resilience strategies including ISO, IEC, ISA, NIST, CAF and CMM frameworks. 展开更多
关键词 Critical infrastructure Protection Critical information infrastructure Protection CYBERSECURITY Operational Technologies Risk Management
下载PDF
An Overview of IT Infrastructure Management in Small Medium Enterprise: A Case Study
18
作者 Firkhan Ali Bin Hamid Ali Khairul Amin Bin Mohd Sukri 《Journal of Modern Accounting and Auditing》 2012年第7期1088-1094,共7页
Nowadays, information technology (IT) has become a part of the working culture and environment in many organizations. Originally, it is not a supportive tool to make any business successful, but it have become the b... Nowadays, information technology (IT) has become a part of the working culture and environment in many organizations. Originally, it is not a supportive tool to make any business successful, but it have become the backbone of successful business recently. Any non-IT organization could become dead and non-productive. When time comes, maybe it will fail in the business market. However, the usage of IT instruments must be carried out in good and conducive environment especially for business market. In this study, a basic and practical management about how to manage IT asset in small organizations will be discussed. Then this kind of management will be further discussed when the company become small medium organization. The implementation of IT infrastructure, the requirements, infrastructures, services, and platform from software to hardware and networking devices needs to be known. However, this study focuses on networking infrastructure such as networking equipments, servers, network monitoring software, costing, and management best practices. 展开更多
关键词 information technology (IT) infrastructure management small medium organization
下载PDF
Areas vulnerable to natural disasters and damage estimation of infrastructure in Busan, Korea
19
作者 JEON Sang-Soo 《Journal of Central South University》 SCIE EI CAS 2014年第4期1499-1507,共9页
Since the damages caused by disasters associated with climate anomalies and the diversification of the social structure increase every year, an efficient management system associated with a damage assessment of the ar... Since the damages caused by disasters associated with climate anomalies and the diversification of the social structure increase every year, an efficient management system associated with a damage assessment of the areas vulnerable to disasters is demanded to prevent or mitigate the damages to infrastructure. The areas vulnerable to disasters in Busan, located at southeastern part of Korea, were estimated based on historical records of damages and a risk assessment of the infrastructure was performed to provide fundamental information prior to the establishment of the real-time monitoring system for infrastructure and establish disaster management system. The results are illustrated by using geographical information system(GIS) and provide the importance of the roadmap for comprehensive and specific strategy to manage natural disasters. 展开更多
关键词 natural disaster damages risk assessment infrastructure disaster management system geographical information system
下载PDF
AMOUNT OF INFORMATION FOR SPATIAL-TEMPORAL CORRELATION FILTER PATTERN RECOGNITION SYSTEM
20
作者 陶纯堪 《Science China Mathematics》 SCIE 1990年第8期1005-1015,共11页
In order to relate the design and analysis of an optical pattern recognition system with the structural parameters, only by introducing the prolate spheroidal wave function (PSWF) can the amount of information be comp... In order to relate the design and analysis of an optical pattern recognition system with the structural parameters, only by introducing the prolate spheroidal wave function (PSWF) can the amount of information be computed. Combining the imaging wave function set {ψi(x)} and distorted wave function set {b_i(p)} and two integral equations they satisfy derives the expression of the amount of information. The design method of matched filter connected with its amount of information is studied, and their amounts of information belonging to different pattern recognition systems are illustrated. It can be seen that the difference of the amounts of information for various systems is obvious. 展开更多
关键词 optical PATTERN RECOGNITION information PROCESSING spatial-temporal CORRELATION filter.
原文传递
上一页 1 2 53 下一页 到第
使用帮助 返回顶部