The technical approach of the development is to take VC++ as programming tool to develop the visualizing function with the help of MAPGIS's API, OpenGL and the technique of scientific visualization to meet the need for the groundwater modeling.
For the principle and algorithm of target location using the pressure and particle velocity combined processing technology based on acoustic sensor array,both technical approach,hardware design and software implementation of the scheme are given.
A general technical approach to the intelligent boiler CAD was proposed,intelligently constructing the scheme based on case knowledge,intelligently analyzing the scheme based on definite method knowledge,intelligently evaluating the scheme based on constraint knowledge,and intelligently adjusting the scheme based on rule knowledge.
The control and evaluation factors of general schemes are the analysis of user requirement and integral design, data sources, map generalization, time used in data production, data criteria, mathematical basis, classes and code of element , data type, technical approach and test.
This paper analyzes the necessity and feasibility of network-based management of the academic records of adult students receiving higher education, and introduces the function,research method,technical approach,result and significance of the system.
The present paper introduces a technical approach in the multi-exit-link campus network to solving effectively the problems of balanced load of multi-exits,international rate of flow expense and network bottleneck by means of PBR and NAT.
This paper begins with the introduction of the basic principles of the cladding pumping technology,the technical approach for the realization of high power amplifiers by using the ytterbium-erbium co-doped dual-clad fiber pumped by the high power multimode pump laser and the comparison with that for the conventional Er-doped fiber amplifiers.
Part II Principally analyses the technical Principles of electronic signature (especially digital signature), gives a introduction to the electronic signature operational programme which based on symmetric encryption and asymmetric encryption and the choice to technical approach of electronic signature of legislation at different levels.