期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
基于GIS的矿山开采沉陷预测电算化研究 被引量:16
1
作者 于广明 张春会 +2 位作者 李振宇 杨伦 董春胜 《岩土力学》 EI CAS CSCD 北大核心 2004年第z1期52-56,共5页
针对地下矿产资源开采诱发的地表沉陷灾害,利用GIS的拓扑分析、信息处理功能,并与概率积分方法计算模型相结合,建立了基于GIS的地表沉陷预计程序模型构架,开发了新的地表沉陷预计程序。该程序与AutoCAD、Matlab接口,结合GIS技术,不仅给... 针对地下矿产资源开采诱发的地表沉陷灾害,利用GIS的拓扑分析、信息处理功能,并与概率积分方法计算模型相结合,建立了基于GIS的地表沉陷预计程序模型构架,开发了新的地表沉陷预计程序。该程序与AutoCAD、Matlab接口,结合GIS技术,不仅给出各种变形的计算等值线图和三维立体图,而且可以实现计算结果的统计和分析,为矿山开采设计和灾害评估提供了依据。 展开更多
关键词 地表沉陷损害 预计程序模型 GIS
下载PDF
The usage of technology in preventing and detecting fraud
2
作者 Vjollca Karapici Ibrahimi 《Chinese Business Review》 2010年第9期22-30,共9页
Auditors of information systems technology (IT) play a major role in the prevention of significant fraud and investigation. Fraud is hard to detect and even more difficult to prevent. All the auditors are responsibl... Auditors of information systems technology (IT) play a major role in the prevention of significant fraud and investigation. Fraud is hard to detect and even more difficult to prevent. All the auditors are responsible for detection, determination of fraud and use of anti-fraud programs. With rapid developments in information, communication and technology, it is no surprise that companies grow and secure IT system, but with the development of technology was developed and fraud schemes. Detection or not the auditor of the fraud, not fulfilling his work reflects you, or not drafting of a plan audit standards and procedures, but he has to do with personal ability auditor, to analyze the findings during the audit, use of tests, the natural limitations of internal control and the fact that most of the findings of the auditor of nature are more persuasive than effective. When you conduct an audit, auditor has a professional skeptic attitude that considers the risk of circumvention of control procedures by management and recognizes that simple fact, the audit procedures that are effective in connection with the discovery of errors, are not suitable for detection and identification fraud. This requires from the auditor to establish a procedure for considering the risk of fraud, in order to detect the exact appearance not as a result of fraud. A particular impact has The Model of Fraud Detection Strategy, as an 8 steps model for identifying fraud, using IT to collect, define and analyze the data and anomalies that highlight indicators of fraud. 展开更多
关键词 FRAUD TECHNOLOGY skeptic attitude
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部