期刊文献+
共找到764篇文章
< 1 2 39 >
每页显示 20 50 100
APPLICATION OF GREY SYSTEM THEORY TO PROCESSING OF MEASURING DATA IN REVERSE ENGINEERING 被引量:3
1
作者 平雪良 周儒荣 安鲁陵 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2003年第1期36-41,共6页
The processing of measuri ng data plays an important role in reverse engineering. Based on grey system the ory, we first propose some methods to the processing of measuring data in revers e engineering. The measured d... The processing of measuri ng data plays an important role in reverse engineering. Based on grey system the ory, we first propose some methods to the processing of measuring data in revers e engineering. The measured data usually have some abnormalities. When the abnor mal data are eliminated by filtering, blanks are created. The grey generation an d GM(1,1) are used to create new data for these blanks. For the uneven data sequ en ce created by measuring error, the mean generation is used to smooth it and then the stepwise and smooth generations are used to improve the data sequence. 展开更多
关键词 reverse engineering gr ey system theory DIGITIZATION data processing grey generation
下载PDF
Neural network approach for modification and fitting of digitized data in reverse engineering~
2
作者 鞠华 王文 +1 位作者 谢金 陈子辰 《Journal of Zhejiang University Science》 EI CSCD 2004年第1期75-80,共6页
Reverse engineering in the manufacturing field is a process in which the digitized data are obtained from an existing object model or a part of it, and then the CAD model is reconstructed. This paper presents an RBF n... Reverse engineering in the manufacturing field is a process in which the digitized data are obtained from an existing object model or a part of it, and then the CAD model is reconstructed. This paper presents an RBF neural network approach to modify and fit the digitized data. The centers for the RBF are selected by using the orthogonal least squares learning algorithm. A mathematically known surface is used for generating a number of samples for training the networks. The trained networks then generated a number of new points which were compared with the calculating points from the equations. Moreover, a series of practice digitizing curves are used to test the approach. The results showed that this approach is effective in modifying and fitting digitized data and generating data points to reconstruct the surface model. 展开更多
关键词 reverse engineering Digitized data Neural network modification and fitting
下载PDF
MODEL RECONSTRUCTION FROM CLOUD DATA FOR RAPID PROTOTYPE MANUFACTURING 被引量:1
3
作者 张丽艳 周儒荣 周来水 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2001年第2期170-175,共6页
Model reconstruction from points scanned on existing physical objects is much important in a variety of situations such as reverse engineering for mechanical products, computer vision and recovery of biological shapes... Model reconstruction from points scanned on existing physical objects is much important in a variety of situations such as reverse engineering for mechanical products, computer vision and recovery of biological shapes from two dimensional contours. With the development of measuring equipment, cloud points that contain more details of the object can be obtained conveniently. On the other hand, large quantity of sampled points brings difficulties to model reconstruction method. This paper first presents an algorithm to automatically reduce the number of cloud points under given tolerance. Triangle mesh surface from the simplified data set is reconstructed by the marching cubes algorithm. For various reasons, reconstructed mesh usually contains unwanted holes. An approach to create new triangles is proposed with optimized shape for covering the unexpected holes in triangle meshes. After hole filling, watertight triangle mesh can be directly output in STL format, which is widely used in rapid prototype manufacturing. Practical examples are included to demonstrate the method. 展开更多
关键词 reverse engineering model reconstruction cloud data data filtering hole filling
下载PDF
Reverse Engineering Closely-Spaced Free-Form Shapes for a Fabric-Over-Body Model
4
作者 Daniel Chen Anish Ravindran Pradeep Vishwabrahmanasaraf 《Engineering(科研)》 2011年第10期1022-1029,共8页
This paper presents a case study of reverse engineering closely-spaced free-form shapes. The raw point cloud data captured from a body scanner was processed to filter most noise and redundancy. They were used to gener... This paper presents a case study of reverse engineering closely-spaced free-form shapes. The raw point cloud data captured from a body scanner was processed to filter most noise and redundancy. They were used to generate meshes through triangulation of points. Upon removal of inconsistencies resulted from residual noise, the clean-up meshes were then used to reconstruct the free-form surfaces that represented a fabric layer and a human body surface. The solid produced between these two surfaces is the fabric-over-body model. It helped generate a FEA (finite-element analysis) mesh with quality checks, such as distortion and stretch, were performed for all the meshed tetrahedral elements. The purpose is to prepare a FEA-ready model for future CFD (computational fluid dynamics) analysis. 展开更多
关键词 reverse engineering Point cloud data Mesh Generation DELAUNAY MESHING Quality CHECKS
下载PDF
On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing 被引量:11
5
作者 Lizhi Xiong Yunqing Shi 《Computers, Materials & Continua》 SCIE EI 2018年第6期523-539,共17页
Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the clou... Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the cloud.In the meantime,some computationally expensive tasks are also undertaken by cloud servers.However,the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data.Recently,this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data.In this paper,two reversible data hiding schemes are proposed for encrypted image data in cloud computing:reversible data hiding by homomorphic encryption and reversible data hiding in encrypted domain.The former is that additional bits are extracted after decryption and the latter is that extracted before decryption.Meanwhile,a combined scheme is also designed.This paper proposes the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing,which not only ensures multimedia data security without relying on the trustworthiness of cloud servers,but also guarantees that reversible data hiding can be operated over encrypted images at the different stages.Theoretical analysis confirms the correctness of the proposed encryption model and justifies the security of the proposed scheme.The computation cost of the proposed scheme is acceptable and adjusts to different security levels. 展开更多
关键词 cloud data security re-encryption reversible data hiding cloud computing privacy-preserving.
下载PDF
Virtual machine placement optimizing to improve network performance in cloud data centers 被引量:3
6
作者 DONG Jian-kang WANG Hong-bo +1 位作者 LI Yang-yang CHENG Shi-duan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第3期62-70,共9页
With the wide application of virtualization technology in cloud data centers, how to effectively place virtual machine (VM) is becoming a major issue for cloud providers. The existing virtual machine placement (VMP... With the wide application of virtualization technology in cloud data centers, how to effectively place virtual machine (VM) is becoming a major issue for cloud providers. The existing virtual machine placement (VMP) solutions are mainly to optimize server resources. However, they pay little consideration on network resources optimization, and they do not concern the impact of the network topology and the current network traffic. A multi-resource constraints VMP scheme is proposed. Firstly, the authors attempt to reduce the total communication traffic in the data center network, which is abstracted as a quadratic assignment problem; and then aim at optimizing network maximum link utilization (MLU). On the condition of slight variation of the total traffic, minimizing MLU can balance network traffic distribution and reduce network congestion hotspots, a classic combinatorial optimization problem as well as NP-hard problem. Ant colony optimization and 2-opt local search are combined to solve the problem. Simulation shows that MLU is decreased by 20%, and the number of hot links is decreased by 37%. 展开更多
关键词 cloud computing data center network virtual machine placement traffic engineering network performance
原文传递
Differentiating Data Collection for Cloud Environment Monitoring 被引量:2
7
作者 MENG You LUAN Zhongzhi QIAN Depei 《China Communications》 SCIE CSCD 2014年第4期13-24,共12页
In a growing number of information processing applications,data takes the form of continuous data streams rather than traditional stored databases.Monitoring systems that seek to provide monitoring services in cloud e... In a growing number of information processing applications,data takes the form of continuous data streams rather than traditional stored databases.Monitoring systems that seek to provide monitoring services in cloud environment must be prepared to deal gracefully with huge data collections without compromising system performance.In this paper,we show that by using a concept of urgent data,our system can shorten the response time for most 'urgent' queries while guarantee lower bandwidth consumption.We argue that monitoring data can be treated differently.Some data capture critical system events;the arrival of these data will significantly influence the monitoring reaction speed which is called urgent data.High speed urgent data collections can help system to react in real time when facing fatal errors.A cloud environment in production,MagicCube,is used as a test bed.Extensive experiments over both real world and synthetic traces show that when using urgent data,monitoring system can lower the response latency compared with existing monitoring approaches. 展开更多
关键词 cloud computing cloud monitoring urgent data rule engine CONSTRAINT
下载PDF
Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map
8
作者 Li-Chin Huang Min-Shiang Hwang Lin-Yu Tseng 《Journal of Electronic Science and Technology》 CAS 2013年第2期230-236,共7页
Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In... Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Henon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images. 展开更多
关键词 cloud computing environments ENCRYPTION Haar digital wavelet transformation Henonmap reversible data embedding.
下载PDF
RESEARCH ON ADAPTIVE DATA COMPRESSION METHOD FOR TRIANGULATED SURFACES 被引量:2
9
作者 Wang Wen Wu Shixiong Chen Zichen Department of Mechanical Engineering,Zhejiang University,Hangzhou 310027, China 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2004年第2期189-192,共4页
NC code or STL file can be generated directly from measuring data in a fastreverse-engineering mode. Compressing the massive data from laser scanner is the key of the newmode. An adaptive compression method based on t... NC code or STL file can be generated directly from measuring data in a fastreverse-engineering mode. Compressing the massive data from laser scanner is the key of the newmode. An adaptive compression method based on triangulated-surfaces model is put forward.Normal-vector angles between triangles are computed to find prime vertices for removal. Ring datastructure is adopted to save massive data effectively. It allows the efficient retrieval of allneighboring vertices and triangles of a given vertices. To avoid long and thin triangles, a newre-triangulation approach based on normalized minimum-vertex-distance is proposed, in which thevertex distance and interior angle of triangle are considered. Results indicate that the compressionmethod has high efficiency and can get reliable precision. The method can be applied in fastreverse engineering to acquire an optimal subset of the original massive data. 展开更多
关键词 data compression reverse engineering Triangulated surfaces
下载PDF
Mesh Generation from Dense 3D Scattered Data Using Neural Network 被引量:8
10
作者 ZHANGWei JIANGXian-feng +1 位作者 CHENLi-neng MAYa-liang 《Computer Aided Drafting,Design and Manufacturing》 2004年第1期30-35,共6页
An improved self-organizing feature map (SOFM) neural network is presented to generate rectangular and hexagonal lattic with normal vector attached to each vertex. After the neural network was trained, the whole scatt... An improved self-organizing feature map (SOFM) neural network is presented to generate rectangular and hexagonal lattic with normal vector attached to each vertex. After the neural network was trained, the whole scattered data were divided into sub-regions where classified core were represented by the weight vectors of neurons at the output layer of neural network. The weight vectors of the neurons were used to approximate the dense 3-D scattered points, so the dense scattered points could be reduced to a reasonable scale, while the topological feature of the whole scattered points were remained. 展开更多
关键词 reverse engineering mesh generation neural network scattered points data extraction
下载PDF
Geometric Feature Extraction and Model Reconstruction Based on Scattered Data
11
作者 胡鑫 习俊通 金烨 《Journal of Donghua University(English Edition)》 EI CAS 2004年第4期86-89,共4页
A method of 3D model reconstruction based on scattered point data in reverse engineering is presented here. The topological relationship of scattered points was established firstly, then the data set was triangulated ... A method of 3D model reconstruction based on scattered point data in reverse engineering is presented here. The topological relationship of scattered points was established firstly, then the data set was triangulated to reconstruct the mesh surface model. The curvatures of cloud data were calculated based on the mesh surface, and the point data were segmented by edge-based method; Every patch of data was fitted by quadric surface of freeform surface, and the type of quadric surface was decided by parameters automatically, at last the whole CAD model was created. An example of mouse model was employed to confirm the effect of the algorithm. 展开更多
关键词 reverse engineering Scattered data Feature extraction Model reconstruction.
下载PDF
Hermite interpolation of scattered data based on the assistant surface
12
作者 王全为 李学艺 +1 位作者 李彬 王小椿 《Journal of Coal Science & Engineering(China)》 2006年第2期108-111,共4页
An assistant surface was constructed on the base of boundary that being auto-matically extracted from the scattered data.The parameters of every data point corre-sponding to the assistant surface and their applied fie... An assistant surface was constructed on the base of boundary that being auto-matically extracted from the scattered data.The parameters of every data point corre-sponding to the assistant surface and their applied fields were calculated respectively.Inevery applied region,a surface patch was constructed by a special Hermite interpolation.The final surface can be obtained by a piecewise bicubic Hermite interpolation in the ag-gregate of applied regions of metrical data.This method avoids the triangulation problem.Numerical results indicate that it is efficient and accurate. 展开更多
关键词 reverse engineering scattered data points surface construction Hermite in- terpolation
下载PDF
(r,QI)-Transform:Reversible Data Anonymity Based on Numeric Type of Data in Outsourced Database
13
作者 Iuon-Chang Lin Yang-Te Lee Chen-Yang Cheng 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第3期222-230,共9页
An outsource database is a database service provided by cloud computing companies.Using the outsource database can reduce the hardware and software's cost and also get more efficient and reliable data processing capa... An outsource database is a database service provided by cloud computing companies.Using the outsource database can reduce the hardware and software's cost and also get more efficient and reliable data processing capacity.However,the outsource database still has some challenges.If the service provider does not have sufficient confidence,there is the possibility of data leakage.The data may has user's privacy,so data leakage may cause data privacy leak.Based on this factor,to protect the privacy of data in the outsource database becomes very important.In the past,scholars have proposed k-anonymity to protect data privacy in the database.It lets data become anonymous to avoid data privacy leak.But k-anonymity has some problems,it is irreversible,and easier to be attacked by homogeneity attack and background knowledge attack.Later on,scholars have proposed some studies to solve homogeneity attack and background knowledge attack.But their studies still cannot recover back to the original data.In this paper,we propose a data anonymity method.It can be reversible and also prevent those two attacks.Our study is based on the proposed r-transform.It can be used on the numeric type of attributes in the outsource database.In the experiment,we discussed the time required to anonymize and recover data.Furthermore,we investigated the defense against homogeneous attack and background knowledge attack.At the end,we summarized the proposed method and future researches. 展开更多
关键词 Index Terms--cloud database data anonymity database privacy outsource database REVERSIBLE
下载PDF
A review of road 3D modeling based on light detection and ranging point clouds
14
作者 Bin Yu Yuchen Wang +4 位作者 Qihang Chen Xiaoyang Chen Yuqin Zhang Kaiyue Luan Xiaole Ren 《Journal of Road Engineering》 2024年第4期386-398,共13页
Increasing development of accurate and efficient road three-dimensional(3D)modeling presents great opportunities to improve the data exchange and integration of building information modeling(BIM)models.3D modeling of ... Increasing development of accurate and efficient road three-dimensional(3D)modeling presents great opportunities to improve the data exchange and integration of building information modeling(BIM)models.3D modeling of road scenes is crucial for reference in asset management,construction,and maintenance.Light detection and ranging(Li DAR)technology is increasingly employed to generate high-quality point clouds for road inventory.In this paper,we specifically investigate the use of Li DAR data for road 3D modeling.The purpose of this review is to provide references about the existing work on the road 3D modeling based on Li DAR point clouds,critically discuss them,and provide challenges for further study.Besides,we introduce modeling standards for roads and discuss the components,types,and distinctions of various Li DAR measurement systems.Then,we review state-of-the-art methods and provide a detailed examination of road segmentation and feature extraction.Furthermore,we systematically introduce point cloud-based 3D modeling methods,namely,parametric modeling and surface reconstruction.Parameters and rules are used to define model components based on geometric and non-geometric information,whereas surface modeling is conducted through individual faces within its geometry.Finally,we discuss and summarize future research directions in this field.This review can assist researchers in enhancing existing approaches and developing new techniques for road modeling based on Li DAR point clouds. 展开更多
关键词 Road engineering LiDAR data 3D modeling Point cloud SEGMENTATION Key feature extraction
下载PDF
ALGORITHM OF PRETREATMENT ON AUTOMOBILE BODY POINT CLOUD 被引量:2
15
作者 GAO Feng ZHOU Yu DU Farong QU Weiwei XIONG Yonghua 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2007年第4期71-74,共4页
As point cloud of one whole vehicle body has the traits of large geometric dimension, huge data and rigorous reverse precision, one pretreatment algorithm on automobile body point cloud is put forward. The basic idea ... As point cloud of one whole vehicle body has the traits of large geometric dimension, huge data and rigorous reverse precision, one pretreatment algorithm on automobile body point cloud is put forward. The basic idea of the registration algorithm based on the skeleton points is to construct the skeleton points of the whole vehicle model and the mark points of the separate point cloud, to search the mapped relationship between skeleton points and mark points using congruence triangle method and to match the whole vehicle point cloud using the improved iterative closed point (ICP) algorithm. The data reduction algorithm, based on average square root of distance, condenses data by three steps, computing datasets' average square root of distance in sampling cube grid, sorting order according to the value computed from the first step, choosing sampling percentage. The accuracy of the two algorithms above is proved by a registration and reduction example of whole vehicle point cloud of a certain light truck. 展开更多
关键词 reverse engineering Point cloud registration Skeleton point Iterative closed point(ICP) data reduction
下载PDF
基于谷歌地球引擎大数据支撑的自然资源生态安全应用研究进展
16
作者 蔡文博 王薇 +3 位作者 朱青 张智舵 彭婉婷 蔡永立 《生态学报》 北大核心 2025年第7期3544-3554,共11页
随着工业革命和城市化进程,全球资源消耗和生态环境恶化加剧,保障自然资源生态安全成为关注焦点。谷歌地球引擎(GEE)作为地球大数据云计算平台,为自然资源生态安全研究提供了新引擎,涵盖评价、预测预警及预案制定等全过程管理。系统梳理... 随着工业革命和城市化进程,全球资源消耗和生态环境恶化加剧,保障自然资源生态安全成为关注焦点。谷歌地球引擎(GEE)作为地球大数据云计算平台,为自然资源生态安全研究提供了新引擎,涵盖评价、预测预警及预案制定等全过程管理。系统梳理了GEE在自然资源生态安全评价、预测预警及预案制定等方面的应用进展,展示了其在森林资源、耕地资源、草地资源等多种自然资源管理中的广泛应用和显著成效。同时,也指出了GEE在数据源、研究深度及预警应用方面存在的不足和挑战。为了进一步提升自然资源生态安全研究水平,提出了基于大数据和云计算技术的自然资源生态安全研究框架,明确了大数据采集、处理、分析及决策支持等关键环节,并强调了自主研发、数据共享与开放的重要性。本研究不仅为当前自然资源生态安全研究提供了理论参考和实践指导,也为未来相关领域的深入探索和创新发展奠定了坚实基础。 展开更多
关键词 自然资源 生态安全 谷歌地球引擎(GEE) 大数据 云计算平台
下载PDF
多源数据驱动的既有建筑安全性评价与预警管理系统研究
17
作者 李灵芝 林雯洁 +3 位作者 钱宇昕 韩晓健 胡汉云 赖文韬 《安全与环境学报》 北大核心 2025年第4期1247-1256,共10页
为满足大规模既有建筑安全性快速评估和常态化安全管理的需求,开发多源数据融合驱动的既有建筑安全性评价与预警管理系统,并展开实例应用。采用多源数据融合方法建立既有建筑数据模型,以解决老旧建筑图纸缺失、模型建立困难问题;利用C#... 为满足大规模既有建筑安全性快速评估和常态化安全管理的需求,开发多源数据融合驱动的既有建筑安全性评价与预警管理系统,并展开实例应用。采用多源数据融合方法建立既有建筑数据模型,以解决老旧建筑图纸缺失、模型建立困难问题;利用C#语言和Dynamo可视化编程进行Revit二次开发,内置既有建筑安全评定逻辑和评定方法;采用案例推理方法构建既有建筑安全预警管理案例库,为既有建筑安全预警管理提供决策参考;以Revit软件为平台载体,创建安全性评价规范鉴定和安全预警管理功能模块,实现既有建筑安全的自动化评估和可视化预警管理。以某老旧教学楼为例,运行已开发的安全性评价与预警管理系统,发现输出安全性评级与专业鉴定结果一致,并形成构件损伤预警清单、输出相似案例及其预警管理对策,验证了系统的可靠性。 展开更多
关键词 安全工程 既有建筑安全 多源数据 BIM技术 多源点云
原文传递
基于OBE理念的农业信息数智化处理研究
18
作者 何柳 《农机化研究》 北大核心 2025年第4期197-202,共6页
基于OBE理念,设计了农业信息系统。首先,基于ZigBee技术设计传感器网络,传感器检测数据通过ZigBee网络和运营商基站上传到农田信息服务器,对同类传感器数据进行融合后,得到同类传感器数据表征值;然后,对6类传感器的表征值进行融合,得到... 基于OBE理念,设计了农业信息系统。首先,基于ZigBee技术设计传感器网络,传感器检测数据通过ZigBee网络和运营商基站上传到农田信息服务器,对同类传感器数据进行融合后,得到同类传感器数据表征值;然后,对6类传感器的表征值进行融合,得到农田环境综合评估结果。设计微信小程序,显示农田中6类传感器的表征值,进而显示农田环境综合评估结果。对传感器上传数据可靠性进行测试,与实地测试对比,误差区间为[0,0.3℃];对微信小程序显示效果进行验证,小程序可以清晰地将农田环境综合评估结果展示给用户。 展开更多
关键词 农业信息 数智化处理 OBE理念 数据融合 反向设计
下载PDF
基于便携数字化记录方式的石窟建筑逆向建模评估——以南京栖霞寺千佛崖三圣殿为例
19
作者 王祺 孙祥望 潘亚威 《城市建筑》 2025年第3期27-30,共4页
石窟建筑通常以集群式分布,呈现出数量多、扫描耗时长等特征,且窟内壁画和佛像具有丰富的色彩纹理和细节特征。文章以南京栖霞寺千佛崖三圣殿为研究对象,通过无人机进行近景摄影测量,并结合手持便携式扫描仪快速获取点云,高效收集其色... 石窟建筑通常以集群式分布,呈现出数量多、扫描耗时长等特征,且窟内壁画和佛像具有丰富的色彩纹理和细节特征。文章以南京栖霞寺千佛崖三圣殿为研究对象,通过无人机进行近景摄影测量,并结合手持便携式扫描仪快速获取点云,高效收集其色彩纹理和几何结构信息。综合运用这两种技术的优势,生成融合点云数据源,建立三维模型,并评估该方法在信息采集效率、几何结构和色彩纹理方面的表现。研究结果证明了此方法在石窟建筑逆向建模应用中的高效性,有效突破了传统扫描石窟建筑方法的局限性,解决了模型管理的难题,展示了其在建筑遗产保护领域的广泛应用前景。 展开更多
关键词 石窟建筑 SLAM 多源数据融合 点云 逆向建模
下载PDF
轨道交通岩土工程勘察大数据智能管理平台研究
20
作者 杨成杰 席文哲 +1 位作者 张俊征 何天乐 《铁路计算机应用》 2025年第1期87-91,共5页
为解决传统勘察数据管理方式在城市轨道交通(简称:城轨)建设中存在的数据管理效率低、应用水平低、安全性差和数据孤岛等问题,基于大数据、云计算等数字化技术,研发了适合国内城轨勘察特点的轨道交通岩土工程勘察大数据智能管理平台。... 为解决传统勘察数据管理方式在城市轨道交通(简称:城轨)建设中存在的数据管理效率低、应用水平低、安全性差和数据孤岛等问题,基于大数据、云计算等数字化技术,研发了适合国内城轨勘察特点的轨道交通岩土工程勘察大数据智能管理平台。文章以数据为核心、应用为导向,采用自底层研发模式,克服了商业系统二次开发的局限性;基于WebGIS可视化、并行空间分析算法、数据协同与交换等关键技术,实现了高效的勘察数据管理,拓展了数据的应用领域,提升了数据的共享和利用价值。该平台已在华中某市多个轨道交通工程实践应用,取得了显著成效,其成果可为城轨交通工程建设的多个阶段提供全方位技术支撑。 展开更多
关键词 城市轨道交通 岩土工程勘察 数字化 大数据 云计算
下载PDF
上一页 1 2 39 下一页 到第
使用帮助 返回顶部