( 4 ) taken haiyan county in zhjiang province as an instance , the extent and rate of the land use change and conversion of the main land use change types in the research region are analyzed with utilizing the decoded data from the rs ( remote sensing ) images in 1986 , 1995 and 2000 . then based on expounding the selecting principles and classification of land use change in the research region , the mechanism of the driving factors both internal and external affecting the land use change is quantitatively analyzed ( 4 )以浙江省海鹽縣為例,首先利用1986年、 1995年和2000年三期遙感影像數據的解譯結果,對研究區土地利用變化的幅度、速度、主要土地利用變化類型的流向進行了分析。然后在闡述研究區土地利用變化驅動因子的選取原則、分類的基礎上,對研究區土地利用變化的內在驅動因子和外在驅動因子的作用機制分別進行了定量分析。
Currently , only protection locks that are developed by using cpu as its major component could use hardware lock to encode and decode data files , so software development companies can not only use protection lock for protecting their software that is developed with great effort , but also use the special encode decode function to protect the data files generated by programs 目前可以利用硬件鎖達成數據文件編碼與譯碼功能的鎖, ?有以cpu為主要組成組件設計的保護鎖,所以軟件開發公司不僅可以利用保護鎖來保護辛苦開發完成的軟件,也可以利用該保護鎖中的特殊編碼譯碼功能來保護軟件程序產生的數據文件。
These information properties include a company s financial data , human resource data , customer information , product sales data etc . because the confidentiality of information properties is getting more and more valuable , software development companies could use the complex designs of software protection lock to enable encode and decode data files , therefore software protection locks have an additional function 這些信息資產包括公司的財務數據人事數據客戶數據銷售數據等。信息資產的保密性愈來愈受重視,而軟件開發公司可利用軟件保護鎖的復雜設計來達到將數據文件做編碼與譯碼的功能,所以軟件保護鎖便又多了一項可利用的價值。