期刊文献+
共找到782篇文章
< 1 2 40 >
每页显示 20 50 100
APPLICATION OF GREY SYSTEM THEORY TO PROCESSING OF MEASURING DATA IN REVERSE ENGINEERING 被引量:3
1
作者 平雪良 周儒荣 安鲁陵 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2003年第1期36-41,共6页
The processing of measuri ng data plays an important role in reverse engineering. Based on grey system the ory, we first propose some methods to the processing of measuring data in revers e engineering. The measured d... The processing of measuri ng data plays an important role in reverse engineering. Based on grey system the ory, we first propose some methods to the processing of measuring data in revers e engineering. The measured data usually have some abnormalities. When the abnor mal data are eliminated by filtering, blanks are created. The grey generation an d GM(1,1) are used to create new data for these blanks. For the uneven data sequ en ce created by measuring error, the mean generation is used to smooth it and then the stepwise and smooth generations are used to improve the data sequence. 展开更多
关键词 reverse engineering gr ey system theory DIGITIZATION data processing grey generation
在线阅读 下载PDF
Neural network approach for modification and fitting of digitized data in reverse engineering~
2
作者 鞠华 王文 +1 位作者 谢金 陈子辰 《Journal of Zhejiang University Science》 EI CSCD 2004年第1期75-80,共6页
Reverse engineering in the manufacturing field is a process in which the digitized data are obtained from an existing object model or a part of it, and then the CAD model is reconstructed. This paper presents an RBF n... Reverse engineering in the manufacturing field is a process in which the digitized data are obtained from an existing object model or a part of it, and then the CAD model is reconstructed. This paper presents an RBF neural network approach to modify and fit the digitized data. The centers for the RBF are selected by using the orthogonal least squares learning algorithm. A mathematically known surface is used for generating a number of samples for training the networks. The trained networks then generated a number of new points which were compared with the calculating points from the equations. Moreover, a series of practice digitizing curves are used to test the approach. The results showed that this approach is effective in modifying and fitting digitized data and generating data points to reconstruct the surface model. 展开更多
关键词 reverse engineering Digitized data Neural network modification and fitting
在线阅读 下载PDF
MODEL RECONSTRUCTION FROM CLOUD DATA FOR RAPID PROTOTYPE MANUFACTURING 被引量:1
3
作者 张丽艳 周儒荣 周来水 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2001年第2期170-175,共6页
Model reconstruction from points scanned on existing physical objects is much important in a variety of situations such as reverse engineering for mechanical products, computer vision and recovery of biological shapes... Model reconstruction from points scanned on existing physical objects is much important in a variety of situations such as reverse engineering for mechanical products, computer vision and recovery of biological shapes from two dimensional contours. With the development of measuring equipment, cloud points that contain more details of the object can be obtained conveniently. On the other hand, large quantity of sampled points brings difficulties to model reconstruction method. This paper first presents an algorithm to automatically reduce the number of cloud points under given tolerance. Triangle mesh surface from the simplified data set is reconstructed by the marching cubes algorithm. For various reasons, reconstructed mesh usually contains unwanted holes. An approach to create new triangles is proposed with optimized shape for covering the unexpected holes in triangle meshes. After hole filling, watertight triangle mesh can be directly output in STL format, which is widely used in rapid prototype manufacturing. Practical examples are included to demonstrate the method. 展开更多
关键词 reverse engineering model reconstruction cloud data data filtering hole filling
在线阅读 下载PDF
Reverse Engineering Closely-Spaced Free-Form Shapes for a Fabric-Over-Body Model
4
作者 Daniel Chen Anish Ravindran Pradeep Vishwabrahmanasaraf 《Engineering(科研)》 2011年第10期1022-1029,共8页
This paper presents a case study of reverse engineering closely-spaced free-form shapes. The raw point cloud data captured from a body scanner was processed to filter most noise and redundancy. They were used to gener... This paper presents a case study of reverse engineering closely-spaced free-form shapes. The raw point cloud data captured from a body scanner was processed to filter most noise and redundancy. They were used to generate meshes through triangulation of points. Upon removal of inconsistencies resulted from residual noise, the clean-up meshes were then used to reconstruct the free-form surfaces that represented a fabric layer and a human body surface. The solid produced between these two surfaces is the fabric-over-body model. It helped generate a FEA (finite-element analysis) mesh with quality checks, such as distortion and stretch, were performed for all the meshed tetrahedral elements. The purpose is to prepare a FEA-ready model for future CFD (computational fluid dynamics) analysis. 展开更多
关键词 reverse engineering Point cloud data Mesh Generation DELAUNAY MESHING Quality CHECKS
在线阅读 下载PDF
On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing 被引量:11
5
作者 Lizhi Xiong Yunqing Shi 《Computers, Materials & Continua》 SCIE EI 2018年第6期523-539,共17页
Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the clou... Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the cloud.In the meantime,some computationally expensive tasks are also undertaken by cloud servers.However,the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data.Recently,this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data.In this paper,two reversible data hiding schemes are proposed for encrypted image data in cloud computing:reversible data hiding by homomorphic encryption and reversible data hiding in encrypted domain.The former is that additional bits are extracted after decryption and the latter is that extracted before decryption.Meanwhile,a combined scheme is also designed.This paper proposes the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing,which not only ensures multimedia data security without relying on the trustworthiness of cloud servers,but also guarantees that reversible data hiding can be operated over encrypted images at the different stages.Theoretical analysis confirms the correctness of the proposed encryption model and justifies the security of the proposed scheme.The computation cost of the proposed scheme is acceptable and adjusts to different security levels. 展开更多
关键词 cloud data security re-encryption reversible data hiding cloud computing privacy-preserving.
在线阅读 下载PDF
Virtual machine placement optimizing to improve network performance in cloud data centers 被引量:3
6
作者 DONG Jian-kang WANG Hong-bo +1 位作者 LI Yang-yang CHENG Shi-duan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第3期62-70,共9页
With the wide application of virtualization technology in cloud data centers, how to effectively place virtual machine (VM) is becoming a major issue for cloud providers. The existing virtual machine placement (VMP... With the wide application of virtualization technology in cloud data centers, how to effectively place virtual machine (VM) is becoming a major issue for cloud providers. The existing virtual machine placement (VMP) solutions are mainly to optimize server resources. However, they pay little consideration on network resources optimization, and they do not concern the impact of the network topology and the current network traffic. A multi-resource constraints VMP scheme is proposed. Firstly, the authors attempt to reduce the total communication traffic in the data center network, which is abstracted as a quadratic assignment problem; and then aim at optimizing network maximum link utilization (MLU). On the condition of slight variation of the total traffic, minimizing MLU can balance network traffic distribution and reduce network congestion hotspots, a classic combinatorial optimization problem as well as NP-hard problem. Ant colony optimization and 2-opt local search are combined to solve the problem. Simulation shows that MLU is decreased by 20%, and the number of hot links is decreased by 37%. 展开更多
关键词 cloud computing data center network virtual machine placement traffic engineering network performance
原文传递
Differentiating Data Collection for Cloud Environment Monitoring 被引量:2
7
作者 MENG You LUAN Zhongzhi QIAN Depei 《China Communications》 SCIE CSCD 2014年第4期13-24,共12页
In a growing number of information processing applications,data takes the form of continuous data streams rather than traditional stored databases.Monitoring systems that seek to provide monitoring services in cloud e... In a growing number of information processing applications,data takes the form of continuous data streams rather than traditional stored databases.Monitoring systems that seek to provide monitoring services in cloud environment must be prepared to deal gracefully with huge data collections without compromising system performance.In this paper,we show that by using a concept of urgent data,our system can shorten the response time for most 'urgent' queries while guarantee lower bandwidth consumption.We argue that monitoring data can be treated differently.Some data capture critical system events;the arrival of these data will significantly influence the monitoring reaction speed which is called urgent data.High speed urgent data collections can help system to react in real time when facing fatal errors.A cloud environment in production,MagicCube,is used as a test bed.Extensive experiments over both real world and synthetic traces show that when using urgent data,monitoring system can lower the response latency compared with existing monitoring approaches. 展开更多
关键词 cloud computing cloud monitoring urgent data rule engine CONSTRAINT
在线阅读 下载PDF
Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map
8
作者 Li-Chin Huang Min-Shiang Hwang Lin-Yu Tseng 《Journal of Electronic Science and Technology》 CAS 2013年第2期230-236,共7页
Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In... Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Henon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images. 展开更多
关键词 cloud computing environments ENCRYPTION Haar digital wavelet transformation Henonmap reversible data embedding.
在线阅读 下载PDF
RESEARCH ON ADAPTIVE DATA COMPRESSION METHOD FOR TRIANGULATED SURFACES 被引量:2
9
作者 Wang Wen Wu Shixiong Chen Zichen Department of Mechanical Engineering,Zhejiang University,Hangzhou 310027, China 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2004年第2期189-192,共4页
NC code or STL file can be generated directly from measuring data in a fastreverse-engineering mode. Compressing the massive data from laser scanner is the key of the newmode. An adaptive compression method based on t... NC code or STL file can be generated directly from measuring data in a fastreverse-engineering mode. Compressing the massive data from laser scanner is the key of the newmode. An adaptive compression method based on triangulated-surfaces model is put forward.Normal-vector angles between triangles are computed to find prime vertices for removal. Ring datastructure is adopted to save massive data effectively. It allows the efficient retrieval of allneighboring vertices and triangles of a given vertices. To avoid long and thin triangles, a newre-triangulation approach based on normalized minimum-vertex-distance is proposed, in which thevertex distance and interior angle of triangle are considered. Results indicate that the compressionmethod has high efficiency and can get reliable precision. The method can be applied in fastreverse engineering to acquire an optimal subset of the original massive data. 展开更多
关键词 data compression reverse engineering Triangulated surfaces
在线阅读 下载PDF
Mesh Generation from Dense 3D Scattered Data Using Neural Network 被引量:8
10
作者 ZHANGWei JIANGXian-feng +1 位作者 CHENLi-neng MAYa-liang 《Computer Aided Drafting,Design and Manufacturing》 2004年第1期30-35,共6页
An improved self-organizing feature map (SOFM) neural network is presented to generate rectangular and hexagonal lattic with normal vector attached to each vertex. After the neural network was trained, the whole scatt... An improved self-organizing feature map (SOFM) neural network is presented to generate rectangular and hexagonal lattic with normal vector attached to each vertex. After the neural network was trained, the whole scattered data were divided into sub-regions where classified core were represented by the weight vectors of neurons at the output layer of neural network. The weight vectors of the neurons were used to approximate the dense 3-D scattered points, so the dense scattered points could be reduced to a reasonable scale, while the topological feature of the whole scattered points were remained. 展开更多
关键词 reverse engineering mesh generation neural network scattered points data extraction
在线阅读 下载PDF
Geometric Feature Extraction and Model Reconstruction Based on Scattered Data
11
作者 胡鑫 习俊通 金烨 《Journal of Donghua University(English Edition)》 EI CAS 2004年第4期86-89,共4页
A method of 3D model reconstruction based on scattered point data in reverse engineering is presented here. The topological relationship of scattered points was established firstly, then the data set was triangulated ... A method of 3D model reconstruction based on scattered point data in reverse engineering is presented here. The topological relationship of scattered points was established firstly, then the data set was triangulated to reconstruct the mesh surface model. The curvatures of cloud data were calculated based on the mesh surface, and the point data were segmented by edge-based method; Every patch of data was fitted by quadric surface of freeform surface, and the type of quadric surface was decided by parameters automatically, at last the whole CAD model was created. An example of mouse model was employed to confirm the effect of the algorithm. 展开更多
关键词 reverse engineering Scattered data Feature extraction Model reconstruction.
在线阅读 下载PDF
Hermite interpolation of scattered data based on the assistant surface
12
作者 王全为 李学艺 +1 位作者 李彬 王小椿 《Journal of Coal Science & Engineering(China)》 2006年第2期108-111,共4页
An assistant surface was constructed on the base of boundary that being auto-matically extracted from the scattered data.The parameters of every data point corre-sponding to the assistant surface and their applied fie... An assistant surface was constructed on the base of boundary that being auto-matically extracted from the scattered data.The parameters of every data point corre-sponding to the assistant surface and their applied fields were calculated respectively.Inevery applied region,a surface patch was constructed by a special Hermite interpolation.The final surface can be obtained by a piecewise bicubic Hermite interpolation in the ag-gregate of applied regions of metrical data.This method avoids the triangulation problem.Numerical results indicate that it is efficient and accurate. 展开更多
关键词 reverse engineering scattered data points surface construction Hermite in- terpolation
在线阅读 下载PDF
(r,QI)-Transform:Reversible Data Anonymity Based on Numeric Type of Data in Outsourced Database
13
作者 Iuon-Chang Lin Yang-Te Lee Chen-Yang Cheng 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第3期222-230,共9页
An outsource database is a database service provided by cloud computing companies.Using the outsource database can reduce the hardware and software's cost and also get more efficient and reliable data processing capa... An outsource database is a database service provided by cloud computing companies.Using the outsource database can reduce the hardware and software's cost and also get more efficient and reliable data processing capacity.However,the outsource database still has some challenges.If the service provider does not have sufficient confidence,there is the possibility of data leakage.The data may has user's privacy,so data leakage may cause data privacy leak.Based on this factor,to protect the privacy of data in the outsource database becomes very important.In the past,scholars have proposed k-anonymity to protect data privacy in the database.It lets data become anonymous to avoid data privacy leak.But k-anonymity has some problems,it is irreversible,and easier to be attacked by homogeneity attack and background knowledge attack.Later on,scholars have proposed some studies to solve homogeneity attack and background knowledge attack.But their studies still cannot recover back to the original data.In this paper,we propose a data anonymity method.It can be reversible and also prevent those two attacks.Our study is based on the proposed r-transform.It can be used on the numeric type of attributes in the outsource database.In the experiment,we discussed the time required to anonymize and recover data.Furthermore,we investigated the defense against homogeneous attack and background knowledge attack.At the end,we summarized the proposed method and future researches. 展开更多
关键词 Index Terms--cloud database data anonymity database privacy outsource database REVERSIBLE
在线阅读 下载PDF
A review of road 3D modeling based on light detection and ranging point clouds 被引量:1
14
作者 Bin Yu Yuchen Wang +4 位作者 Qihang Chen Xiaoyang Chen Yuqin Zhang Kaiyue Luan Xiaole Ren 《Journal of Road Engineering》 2024年第4期386-398,共13页
Increasing development of accurate and efficient road three-dimensional(3D)modeling presents great opportunities to improve the data exchange and integration of building information modeling(BIM)models.3D modeling of ... Increasing development of accurate and efficient road three-dimensional(3D)modeling presents great opportunities to improve the data exchange and integration of building information modeling(BIM)models.3D modeling of road scenes is crucial for reference in asset management,construction,and maintenance.Light detection and ranging(Li DAR)technology is increasingly employed to generate high-quality point clouds for road inventory.In this paper,we specifically investigate the use of Li DAR data for road 3D modeling.The purpose of this review is to provide references about the existing work on the road 3D modeling based on Li DAR point clouds,critically discuss them,and provide challenges for further study.Besides,we introduce modeling standards for roads and discuss the components,types,and distinctions of various Li DAR measurement systems.Then,we review state-of-the-art methods and provide a detailed examination of road segmentation and feature extraction.Furthermore,we systematically introduce point cloud-based 3D modeling methods,namely,parametric modeling and surface reconstruction.Parameters and rules are used to define model components based on geometric and non-geometric information,whereas surface modeling is conducted through individual faces within its geometry.Finally,we discuss and summarize future research directions in this field.This review can assist researchers in enhancing existing approaches and developing new techniques for road modeling based on Li DAR point clouds. 展开更多
关键词 Road engineering LiDAR data 3D modeling Point cloud SEGMENTATION Key feature extraction
在线阅读 下载PDF
基于Geomagic人体下颌骨逆向曲面重构与3D打印关键技术 被引量:1
15
作者 曾锋 熊学慧 《机械工程师》 2025年第5期157-160,164,共5页
利用光学扫描仪获取人体下颌骨的点云数据,利用Geomagic Wrap软件对人体下颌骨的点云数据进行处理和优化,利用Geomagic Design X软件完成人体下颌骨的三维曲面重构,并分析拟合曲面的精度,运用先进的快速成型技术完成人体下颌骨的制作,... 利用光学扫描仪获取人体下颌骨的点云数据,利用Geomagic Wrap软件对人体下颌骨的点云数据进行处理和优化,利用Geomagic Design X软件完成人体下颌骨的三维曲面重构,并分析拟合曲面的精度,运用先进的快速成型技术完成人体下颌骨的制作,阐述了基于Geomagic软件技术的人体下颌骨逆向曲面重构与3D打印关键技术,对人造骨骼的修复、仿制和再设计具有非常好的借鉴意义。 展开更多
关键词 点云数据处理 人体下颌骨 逆向逆向建模 3D打印
暂未订购
大数据在井筒工程的应用和发展
16
作者 张智 王翔辉 +3 位作者 丁剑 赵捷 武林芳 侯振永 《西南石油大学学报(自然科学版)》 北大核心 2025年第6期1-14,共14页
工业4.0技术革命促进油气行业步入数字化、智能化高速发展的智慧油田新阶段,中国石油领域数字化建设和应用集成取得多项进展,已采集钻井、录井、测井、试油气、分析化验和油气生产等多项海量勘探开发的数据;并对数据展开多项大数据分析... 工业4.0技术革命促进油气行业步入数字化、智能化高速发展的智慧油田新阶段,中国石油领域数字化建设和应用集成取得多项进展,已采集钻井、录井、测井、试油气、分析化验和油气生产等多项海量勘探开发的数据;并对数据展开多项大数据分析,加快自动化建设及智能决策等。但使用的数据面临井筒工程数据库标准不统一、数据深度共享难、数据孤岛问题严重等挑战。为加速地质-工程一体化建设和应用,深化井筒工程大数据服务及智慧油田建设,分析了井筒工程大数据与传统大数据的联系与区别,统计了国内外油气大数据技术与平台现状,介绍了井筒数据特征和层次,总结了常见井筒工程问题的大数据算法;提出了如何根据业务需求进行算法优选的方案。最后,对当前大数据技术在井筒工程中应用存在的问题提出了发展性建议。 展开更多
关键词 井筒工程 大数据 人工智能 油气云平台 地质-工程一体化
在线阅读 下载PDF
基于三维点云的桥梁预制钢箱梁制造质量评估
17
作者 吴志刚 徐畅 +2 位作者 殷亮 车平 熊文 《重庆交通大学学报(自然科学版)》 北大核心 2025年第9期26-33,58,共9页
钢结构相比混凝土结构具有强度高、施工周期短、低碳环保等优势,因而在大型桥梁等基础设施项目中得到日益广泛的应用。为确保结构性能,需在安装前对钢构件的制造质量进行精准评估。然而,现阶段此类检测仍高度依赖人工操作,存在场地占用... 钢结构相比混凝土结构具有强度高、施工周期短、低碳环保等优势,因而在大型桥梁等基础设施项目中得到日益广泛的应用。为确保结构性能,需在安装前对钢构件的制造质量进行精准评估。然而,现阶段此类检测仍高度依赖人工操作,存在场地占用大、检测效率低等问题。采用三维激光扫描技术,基于高精度三维点云模型开展预制构件制造质量的检测与评估研究。首先,针对预制梁场的复杂环境,提出了三维激光扫描测站选位的优化原则及现场实施方法;随后,对采集的点云数据进行配准、去噪和下采样等预处理操作,以提升数据质量和处理效率;最后,基于Alpha Shape算法、随机抽样一致性算法和主成分分析算法,提出了空间几何尺寸和表面平整度的自动检测与评估方法。该方法在“深中通道”工程中标准钢箱梁上成功应用,结果表明:三维激光扫描和三维点云模型可以为预制构件制造质量的评估提供有力支撑,所提出的检测方法具有自动化程度好、效率高、结果可视化等优势,能够有效辅助检测人员开展预制构件的制造质量控制与管理工作。 展开更多
关键词 桥梁工程 制造质量评估 预制构件 三维激光扫描 点云数据 钢箱梁
在线阅读 下载PDF
基于组合赋权和云模型的航空发动机状态评估
18
作者 曲春刚 王长乐 《南京航空航天大学学报(自然科学版)》 北大核心 2025年第4期670-680,共11页
为了解决发动机状态评估中状态信息的随机性和模糊性问题,提出了一种基于组合赋权和云模型的航空发动机状态评估方法。经过原理分析、专家经验、相关性分析,对发动机构建层级化指标体系;通过层次分析法和熵权法分别确定其主客观权重,再... 为了解决发动机状态评估中状态信息的随机性和模糊性问题,提出了一种基于组合赋权和云模型的航空发动机状态评估方法。经过原理分析、专家经验、相关性分析,对发动机构建层级化指标体系;通过层次分析法和熵权法分别确定其主客观权重,再通过线性组合赋权法确定组合权重;针对航空发动机确定评价标准等级及其区间,通过相对劣化度映射状态等级评分、云模型进行定性分析和相似度进行定量分析;以A320系列飞机上多台发动机的QAR数据进行分析验证。其中某台使用初期的发动机结果表明:发动机从最初的强离散健康状态趋于弱离散亚健康状态,对应零部件问题的逐渐显露和磨合期趋于稳定的实际情况。因此,基于组合赋权和云模型的航空发动机状态评估模型有效,为识别发动机的状态、了解发动机的长期趋势、采取预防性维修和提高飞行安全性提供有力保障。 展开更多
关键词 航空发动机 状态评估 组合赋权 云模型 QAR数据
在线阅读 下载PDF
无线传感网络数据异常状态检测算法 被引量:1
19
作者 王晨 刘鑫 《传感技术学报》 北大核心 2025年第6期1133-1137,共5页
当前的无线传感网络异常状态检测均是基于节点本身状态产生的阈值形成判断,有一定的检测滞后性。为提高传感网络的稳定性和可靠性,提出一种新的无线传感网络状态数据异常检测算法。通过逆向云发生器和正向云发生器对传感器节点状态采集... 当前的无线传感网络异常状态检测均是基于节点本身状态产生的阈值形成判断,有一定的检测滞后性。为提高传感网络的稳定性和可靠性,提出一种新的无线传感网络状态数据异常检测算法。通过逆向云发生器和正向云发生器对传感器节点状态采集的通信状态数据进行预处理和转换,完成缺失传感数据的填充。根据填充后状态数据确定短期特征,获取通信状态数据特征,构建异常传感节点数据特征模型,确定目标节点周围存在的邻居节点状态,根据实际检测情况更新、完善数据目标特征,输出传感器节点状态通信异常状态数据,从而实现异常数据检测。仿真结果表明,所提算法的异常数据检测时间始终低于0.5 s,三次迭代中的平均绝对误差在0.2以下,具有良好的检测效果。 展开更多
关键词 无线传感网络 数据异常状态检测 云模式 逆向云发生器 正向云发生器
在线阅读 下载PDF
基于谷歌地球引擎大数据支撑的自然资源生态安全应用研究进展 被引量:1
20
作者 蔡文博 王薇 +3 位作者 朱青 张智舵 彭婉婷 蔡永立 《生态学报》 北大核心 2025年第7期3544-3554,共11页
随着工业革命和城市化进程,全球资源消耗和生态环境恶化加剧,保障自然资源生态安全成为关注焦点。谷歌地球引擎(GEE)作为地球大数据云计算平台,为自然资源生态安全研究提供了新引擎,涵盖评价、预测预警及预案制定等全过程管理。系统梳理... 随着工业革命和城市化进程,全球资源消耗和生态环境恶化加剧,保障自然资源生态安全成为关注焦点。谷歌地球引擎(GEE)作为地球大数据云计算平台,为自然资源生态安全研究提供了新引擎,涵盖评价、预测预警及预案制定等全过程管理。系统梳理了GEE在自然资源生态安全评价、预测预警及预案制定等方面的应用进展,展示了其在森林资源、耕地资源、草地资源等多种自然资源管理中的广泛应用和显著成效。同时,也指出了GEE在数据源、研究深度及预警应用方面存在的不足和挑战。为了进一步提升自然资源生态安全研究水平,提出了基于大数据和云计算技术的自然资源生态安全研究框架,明确了大数据采集、处理、分析及决策支持等关键环节,并强调了自主研发、数据共享与开放的重要性。本研究不仅为当前自然资源生态安全研究提供了理论参考和实践指导,也为未来相关领域的深入探索和创新发展奠定了坚实基础。 展开更多
关键词 自然资源 生态安全 谷歌地球引擎(GEE) 大数据 云计算平台
在线阅读 下载PDF
上一页 1 2 40 下一页 到第
使用帮助 返回顶部