搜索结果: 1-5 共查到“航空、航天科学技术 case study”相关记录5条 . 查询时间(0.078 秒)
AN IMPROVED DEM CONSTRUCTION METHOD FOR MUDFLATS BASED ON BJ-1 SMALL SATELLITE IMAGES: A CASE STUDY ON BOHAI BAY
Mudflats BJ-1 image Waterline detection method Tidal grid model DEM
2018/5/15
The topographic measurement of muddy tidal flat is restricted by the difficulty of access to the complex, wide-range and dynamic tidal conditions. Then the waterline detection method (WDM) has the pot...
LAND USE/LAND COVER CHANGE DETECTION USING MULTI–TEMPORAL SATELLITE DATASET: A CASE STUDY IN ISTANBUL NEW AIRPORT
Multi-temporal satellite dataset Land Use/Land Cover Landsat-8 Sentinel 2A Change detection
2018/5/8
In recent years, especially in metropolitan cities such as Istanbul, the emerging needs of the increasing population and demand for better air transportation capacity have led to big environmental cha...
CHALLENGES AND OPPORTUNITIES FOR THE IMPLEMENTATION OF H-BIM WITH REGARDS TO HISTORICAL INFRASTRUCTURES: A CASE STUDY OF THE PONTE GIORGINI IN CASTIGLIONE DELLA PESCAIA (GROSSETO – ITALY)
H-BIM Cultural Heritage (SfM) Structure from Motion (TLS) Terrestrial Laser Scanner (UAV) Unmanned Aerial Vehicle monitoring interoperability
2017/6/20
Historical Building Information Modeling (H-BIM) has been widely documented in literature and is becoming more popular with government bodies, who are increasingly choosing to make its use mandatory i...
Assessing the Security of a Navigation System:A Case Study using Enhanced Loran
Assessing Security Navigation System Enhanced Loran
2015/6/25
Global Navigation Satellite Systems (GNSS) has become increasingly interwoven into the fabric of our infrastructure and economic system. However, as GNSS becomes more important for safety of life and ...
Efficient authentication mechanisms for navigation systems–a radio-navigation case study
authentication mechanisms navigation systems radio-navigation
2015/6/25
In this paper we introduce an efficient authentication mechanism especially designed for navigation systems that is based upon the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) algorithm...