ArcGIS坐标系转换出错:Error 999999执行函数出错 invalid extent for output coordinate system...

       本文主要介绍在用ArcGIS做坐标系转换过程中可能会遇到的一个问题,并分析其原因和解决方案。

       如下图,对一份数据做坐标系转换:

       

       过了一会儿,转换失败了。错误消息如下:

       

       “消息”中提示,“执行函数出错 invalid extent for output coordinate system”,从这句话本人看不出多大的端倪。找高人指点得知,

这份数据的投影坐标是高斯-克吕格投影38度带的,但它的坐标系确是114的(右键地图显示区域,点击数据框属性

                              

       显示坐标系为:Xian 1980 3 Degree GK CM 114

                         

        所以,我们必须给这份数据添加一个高斯-克吕格投影38度带的

坐标系,然后再做“投影”(由高斯-克吕格38度带转换为地理坐标系)。

        

解决方案:

      定义38度投影

      

     

      更改应用:定义结束之后,图框内的地图消失了,右键打开”数据框属性“,然后发现其坐标系依然是114的,说明数据框的坐标系还没有更新过来。将数据框的坐标系改为38度,

便可以正确地显示38度的地图了。或者也可以将数据关闭,从新打开一次,也可以正确看到地图。

     坐标转化为地理坐标之后,右下角显示的单位可能还是“米”,此时,打开“数据框 属性”,按如下图选中“度十进分制”:

                    

      自此,坐标系转化就算成功了。

 

 

       

 

 

 

 

 

转载于:https://www.cnblogs.com/dowtowne/p/3466866.html

  • 1
    点赞
  • 13
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Firewall technology has matured to the extent that today’s firewalls can coordinate security with other firewalls and intrusion detection systems. They can scan for viruses and mali-cious code in electronic mail and web pages. Firewalls are now standard equipment for Internet connections. Home users who connect to commercial Internet service providers via dial-up or via cable/DSL are also using personal firewalls and firewall appliances to secure their connections. Firewalls protect sites from exploitation of inherent vulnerabilities in the TCP/IP protocol suite. Additionally, they help mitigate security problems associated with insecure systems and the problems inherent in providing robust system security for large numbers of com-puters. There are several types of firewalls, ranging from boundary routers that can provide access control on Internet Protocol packets, to more powerful firewalls that can close more vulnerabilities in the TCP/IP protocol suite, to even more powerful firewalls that can filter on the content of the traffic. The type of firewall to use depends on several factors, including the size of the site, the amount of traffic, the sensitivity of systems and data, and the applications required by the organization. The choice of firewall should largely be driven by its feature set, rather than the type of firewall, however. A standard firewall configuration involves using a router with access control capability at the boundary of the organization’s network, and then using a more powerful firewall located behind the router. Firewall environments are made up of firewall devices and associated systems and applica-tions designed to work together. For example, one site may use a firewall environment composed of a boundary router, a main firewall, and intrusion detection systems connected to the protected network and the network between the router and main firewall. To provide secure remote access, the firewall may incorporate a virtual private network (VPN) server to encrypt traffic between the firewall and telecommuters or between the firewall and other sites on the Internet. The firewall environment may incorporate specialized networks for locating externally accessible servers such as for websites and email. The configuration of the firewall environment must be done carefully so as to minimize complexity and man-agement, but at the same time provide adequate protection for the organization’s networks. As always, a policy is essential. Firewalls are vulnerable themselves to misconfigurations and failures to apply needed patches or other security enhancements. Accordingly, firewall configuration and administra-tion must be performed carefully and organizations should also stay current on new vulner-abilities and incidents. While a firewall is an organization’s first line of defense, organiza-tions should practice a defense in depth strategy, in which layers of firewalls and other secu-rity systems are used throughout the network. Most importantly, organizations should strive to maintain all systems in a secure manner and not depend solely on the firewall to stop se-curity threats. Organizations need backup plans in case the firewall fails. This document contains numerous recommendations for choosing, configuring, and main-taining firewalls. These recommendations are summarized in Appendix C.

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值