Ponder on the Evaluation for the Implementation Effect of Mining Remote Sensing Monitoring

Article Preview

Abstract:

The paper firstly introduces mining remote sensing monitoring and the specific implementation situation briefly, and then points out the necessity of the evaluation for the implementation effect of mining remote sensing monitoring. According to the role of "Operability, Integrity, Key and Dynamic” and on the basis of the goal of “Effect, Effectiveness, Efficiency” which is called “3E”, the paper constructs the index system of the evaluation for the implementation effect of mining remote sensing monitoring. At last, the author not only gives his own opinions for the method of the evaluation for the implementation effect of mining remote sensing monitoring, but also presents the specific roadmap of the work. It has reference significance to promote the evaluation for the implementation effect of mining remote sensing monitoring in the whole country

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1325-1330

Citation:

Online since:

September 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Legal Education Network. The Guidance about Develop Budget Performance Evaluation for Investment Projects of the Central Government. (The Ministry of Finance [2004] No.729) [EB/OL],http://www.chinalawedu.com/news/1200/22016/22019/22074/2006/3/zh472019235418360022726-0.htm.

Google Scholar

[2] Ministry of Land and Resources of the PRC Network. The National Mineral Resource Planning(2008~2015)[EB/OL], http://www.mlr.gov.cn/xwdt/zytz/200901/t20090107_113776.htm.

Google Scholar

[3] Jianhua Ju, Yan Wang, Jiahong Li, Ke Chen. The Application of Remote Sensing Technique in Land Management [M].Beijing: Geological Publishing House, 2009(In Chinese).

Google Scholar

[4] Jinsheng Zhou, Ruibing Zhu, The Application of Remote Sensing Technique in Land Resource Investigation and Management[C], The 2nd International Conference on Information Science and Engineering (ICISE2010) , Vol.9, Dec, 2010, pp.6990-6993.

DOI: 10.1109/icise.2010.5688921

Google Scholar