Bridge Type Selection of Key Technology Research Based on Adaptive

被引:0
|
作者
Chen Changsong [1 ]
Dong Daofu [1 ]
Yu Haitao [1 ]
机构
[1] Changsha Univ Sci & Technol, Changsha 410114, Hunan, Peoples R China
关键词
Database System; Bridge Type Selection Key Technology; Comparison and Selection Analysis;
D O I
10.1109/ICICTA.2014.222
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Conduct bridge type adaptability research in national scope, based on this, construct the highway bridge type adaptability database system [1], and put forward the bridge type adaptability evaluation method, evaluation index and its value based on the typical bridge comprehensive performance. On the foundation of the database system and bridge adaptability index, establish the bridge type selection analysis model based on the analytic hierarchy process and fuzzy mathematics theory, then depend on this, conduct comparison and selection analysis on the new bridge type sample and form the bridge type selection key technology [2].
引用
收藏
页码:924 / 927
页数:4
相关论文
共 50 条
  • [31] The Key Technology Research of Spatial Data Crawl Based on Web
    An Dezhi
    Wu Guangli
    Lu Jun
    MATERIAL SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY II, 2014, 651-653 : 1988 - 1991
  • [32] Component Based Software Reuse Key Technology Research and Design
    Meng Youxin
    Meng Xianghai
    Yang Weimin
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 89 - +
  • [33] Key Technology Research for Content Supervision Based on KAD Network
    Li Qiang
    Tang Bo
    Yang Jie
    PROCEEDINGS 2016 FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP 2016), 2016, : 72 - 77
  • [34] Research on Key Technology of Yacht Positioning Based on Binocular Parallax
    Wang, Wei
    Wei, Ping
    Liu, Zengzhi
    OPTOELECTRONIC IMAGING AND MULTIMEDIA TECHNOLOGY IV, 2016, 10020
  • [35] The Key Technology Research on Privacy Protection Based on Big Data
    Li, Xueguo
    Shen, Yinglan
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING AND INFORMATION TECHNOLOGY (ICMEIT), 2016, 57 : 204 - 209
  • [36] Research and Implementation of Key Technology Based on Internet Encryption and Authentication
    Fang Ying-lan
    Han Bing
    Li Ye-bai
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 179 - 182
  • [37] Research on the key technology in the integration of product information based on XML
    Gou, Lingyi
    Xiong, Guangleng
    Xie, Jinchong
    Chai, Xudong
    Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2002, 14 (02): : 105 - 110
  • [38] The Key Technology Research of Virtual Laboratory based On Cloud Computing
    Zhang, Ling
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 1516 - 1521
  • [39] Research on VPN key technology
    Zhang, Dalu
    Hu, Xianfeng
    Jisuanji Gongcheng/Computer Engineering, 2000, 26 (03): : 41 - 42
  • [40] RESEARCH ON THE KEY TECHNOLOGY OF REFARMING
    Liang, Tong
    Meng, Dexiang
    He, Jiwei
    Wang, Shoufeng
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 879 - 883