Surveying Instruments

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Active Surveying

Opinion leaders play an important role in influencing people’s opinions, actions and behaviors. Although a number of methods have been proposed in literature for identifying influentials using secondary sources of information, the true set of opinion leaders revealed through primary sources, such as surveys, is still favored in many domains. In this work, we present a new active learning method...

متن کامل

Some Land Surveying Problems

It is not probable that many of you would be interested in the academic presentation of a method for finding the area of a given polygon, as you each have a system of your own which is probably mathematically acceptable. However, I might take the liberty of citing to you pages 300 and 301 in Engineering Surveys, Elementary and Applied, by Rubey, Lommel, Todd, where you will find a good discussi...

متن کامل

Surveying Prison Environments

SURVEYING PRISON ENVIRONMENTS WILLIAM G. SAYLOR OFFICE OF RESEARCH FEDERAL BUREAU OF PRISONS There are primarily two approaches to measuring organizational properties such as climates: the subjective or psychological approach and the objective or structural approach. Previous organizational climate studies have generally relied on either one approach or the other, but not both, in a single anal...

متن کامل

Surveying Mobile Television

This paper will discuss the basic characteristics of standards for mobile television (Mobile IPTV, T-DMB, MediaFLO, ISDB-T, DVB-H), the basic differences at the technical level and finally present an overview of a proposed architecture for the deployment of mobile TV services combining difussion networks with ad hoc ones, which has been generated from projects developed in the experimental labo...

متن کامل

Surveying Wi-fi Security

This paper is a study of the use and possible flaws of the two basic cryptographic protocols (WEP, WPA) in Wi-Fi Networks. It is presenting some very easy to implement methods to gain malicious access to such networks by disclosing the network secret key, using Windows Operating Systems, like Win XP. It is also describing the shutter of the myth saying that the MAC Address filtering is a safe p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Geographical Journal

سال: 1906

ISSN: 0016-7398

DOI: 10.2307/1776524