Air photography by means of hardware-software solution GeoScan-PhotoScan
نویسندگان
چکیده
منابع مشابه
solution of security constrained unit commitment problem by a new multi-objective optimization method
چکیده-پخش بار بهینه به عنوان یکی از ابزار زیر بنایی برای تحلیل سیستم های قدرت پیچیده ،برای مدت طولانی مورد بررسی قرار گرفته است.پخش بار بهینه توابع هدف یک سیستم قدرت از جمله تابع هزینه سوخت ،آلودگی ،تلفات را بهینه می کند،و هم زمان قیود سیستم قدرت را نیز برآورده می کند.در کلی ترین حالتopf یک مساله بهینه سازی غیر خطی ،غیر محدب،مقیاس بزرگ،و ایستا می باشد که می تواند شامل متغیرهای کنترلی پیوسته و گ...
Hydrochemically separation of gold from Copper Anode Slime by means of Thiourea solution
However, the conventional gold recovery process is cyanidation, due to the recent environmental laws; researchers are looking for alternative methods for the recovery of gold. Furthermore, the copper anode slime is one of the most important secondary sources of gold (about 1200 ppm). So, the main objective of the current work is gold separation from copper anode slime as a rich secondary source...
متن کاملHierarchical Clustering of Distributed Object-Oriented Software Systems: A Generic Solution for Software-Hardware Mismatch Problem
During the software lifecycle, the software structure is subject to many changes in order to fulfill the customer’s requirements. In Distributed Object Oriented systems, software engineers face many challenges to solve the software-hardware mismatch problem in which the software structure does not match the customer’s underlying hardware. A major design problem of Object Oriented software syste...
متن کاملDescribing Radio Hardware and Software Using OWL for Over-The-Air Software Download
Recently, several researchers have discovered the need for radios to use description techniques. Previous research describes information such as the current frequency band, waveform, and so on. However, this information is presented at a level that is not sufficient to determine software/hardware compatibility for over-the-air software download. For example, a device should not attempt to downl...
متن کاملSoftware Protection by Hardware and Obfuscation
In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote server on the same network. We show that such a protection method can be combined with the code obfuscation method and develop two obfuscation methods for the proposed software protection architecture.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: CAD&GIS for roads
سال: 2014
ISSN: 2310-4376
DOI: 10.17273/cadgis.2014.1.10