期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
建筑物基础水平位移监测方法探讨 被引量:4
1
作者 李天和 《测绘通报》 CSCD 北大核心 2003年第10期63-64,共2页
在建筑物密集地区利用距离差分测量原理进行高层建筑重要方向水平移动监测的方法,探讨差分距离测量的精度。
关键词 建筑物 水平移动监测 差分距离测量 变形监测
下载PDF
融合无人机机载激光雷达的变形监测技术研究 被引量:3
2
作者 李昊燔 黎娟 田方 《自动化与仪器仪表》 2023年第8期121-125,共5页
为提高变形监测精度,提出一种融合无人机机载激光雷达的变形监测方法。方法通过采用点云差值法(Point cloud difference,PCD)计算两期待监测区域的地表下沉数字表面模型(Digital Surface Model,DSM)差值,并基于无人机机载激光雷达数字... 为提高变形监测精度,提出一种融合无人机机载激光雷达的变形监测方法。方法通过采用点云差值法(Point cloud difference,PCD)计算两期待监测区域的地表下沉数字表面模型(Digital Surface Model,DSM)差值,并基于无人机机载激光雷达数字正射影像图(Digital Ortho Map,DOM)计算地表水平移动矢量,分别实现了地表下沉监测和水平移动监测。仿真结果表明,所提方法可通过地表下沉监测和水平移动监测,有效、可靠地监测地表变形。在整个监测过程中,像控点精度对变形监测精度具有重要影响,随着像控点中误差的增加,下沉监测与水平移动监测误差增加,误差分布区间占比减小;当平面中误差和高程中误差均为6 cm时,下沉监测误差和水平移动监测误差分别为0.3 cm和0.2 cm,有效提高了变形监测精度,满足了变形监测误差需求,具有一定的实际应用价值。 展开更多
关键词 无人机 激光雷达 变形监测 水平移动监测 下沉监测
原文传递
Clustered trajectories anonymity in wireless sensor networks
3
作者 Seble Hailu Dady Wang Jiahao +1 位作者 Qin Zhiguang Yang Fan 《High Technology Letters》 EI CAS 2015年第2期140-146,共7页
This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is ... This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed. CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources. Thus anonymity of each trajectory and that of the clustered is achieved. In addition, location kdiversity is achieved by dis tributing fake sources around the base station. To reduce the time delay, tree rooted at the base sta tion is constructed to overlap part of the beacon interval of the nodes in the hierarchy. Both the ana lytical analysis and the simulation results prove that proved energy overhead and time delay. our scheme provides perfect anonymity with improved energy overhead and time delay. 展开更多
关键词 clustered trajectories anonymity scheme (CTA) source location privacy K-ANONYMITY global attackers wireless sensor networks (WSNs)
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部