Way to avoid using Spatial Cartridge?

I have a table that stores the coordinate information of images by storing the coordinate information of the four corners of the image. I need to search the table for all cases where a given coordinate point is in the 4 corner coordinate points of the image. Can I do this without using Spatial Cartridge? Is there some easy function that can do this?

Why do you want to avoid using the cartridge?
If you have Locator or Oracle Spatial installed but don't want to alter
the table's definition I would create a view and construct an SDO_GEOMETRY
from the coordinates columns in the table. I would use a function based index
to index the generated geometry. Then you can search to your heart's content
using native Oracle Spatial capabilities that would not require to you to write code!
create or replace view foo_polygon
as
select
foo.attributes....,
mdsys.sdo_geometry(2003,SRID?,NULL,
MDSYS.SDO_ELEM_INFO(1,1003,1),
MDSYS.SDO_ORDINATES(x1,y1,x1,y2,x2,y2,x2,y1,x1,y2)) as geom
from foo;
insert into user_sdo_geom_metadata (table_name,column_name,srid,diminfo)
values ('FOO','GEOM,SRID?,
mdsys.sdo_dim_array(
-- No idea what your X data range is but assume it is -180 -> 180
mdsys.sdo_dim_element('X', -180,180, 0.5),
-- No idea what your Y range is but assume it is -90 -> 90
mdsys.sdo_dim_element('Y', -90, 90, 0.5)
create index foo_polygon_ndx
on
foo( mdsys.sdo_geometry(2003,SRID?,NULL,
MDSYS.SDO_ELEM_INFO(1,1003,1),
MDSYS.SDO_ORDINATES(x1,y1,x1,y2,x2,y2,x2,y1,x1,y2)))
indextype is mdsys.spatial_index
parameters ('sdo_indx_dims=2');
Then query like ....
SELECT count(*)
FROM foo_polygon A
WHERE MDSYS.SDO_FILTER(
A.SHAPE,
MDSYS.SDO_GEOMETRY(2003,NULL,NULL,
MDSYS.SDO_ELEM_INFO_ARRAY(1,1003,3),
MDSYS.SDO_ORDINATE_ARRAY(&llx,&lly,&urx,&ury)),
'querytype=window') = 'TRUE';
S

Similar Messages

  • Any way to avoid ''Use itunes to restore"?

    My grandaughter asked me to load some music on her eyepod. But it reads "Use itunes to  restore". Is there any way I can bypass the restore and add more music? Thank you.

    The ring volume is seperate from the iPod or 3rd party apps volume. You can have these at seperate levels. As a test, I made sure the ringer volume is at 100%. I started playing a song and lowered the iPod volume to 50%. I stopped the song and checked the ringer volume which remained at 100%.
    There is no lock setting for this. If you adjust the volume when not using the iPod or when not playing a 3rd party app, it will adjust the ringer volume.

  • How to avoid using constants ?

    Hello,
    I am starting a new project and I am thinking of a way to avoid using constants.
    For example, in a report, it selects all the order with types ZLN and ZLB.
    I know that I have several possibilities :
    - hard code it in the program (using constants which I want to avoid)
    - create a specific table with all the types that I want to select (this may be the best solution but it can be very long -> too much table to create)
    - put the parameter in the selection screen (but then we have to put default values which come back to the same problem)
    So, I didn't found any perfect solution, Do you know what is the method recommended by SAP ?
    What kind of technics did you use in you projects ?
    Thank you for your help !

    Hi Friend ,
    As you taught , there are  multiple  ways to handle the constants in the program.
    But finally time & efficency matters alot  .
    so my  idea would be  i will  list all the constant & get the quick understanding of the constant type's.
    For example : Order type is Customizing data  which will maintained  by Fun.Consultant  , so i will give work for him to maitain the Varient against  Order type in the TVARC table .so that  in the program  i will declare one order type vraible  under atselection-screen event i will write select Query to get the vaule from the TVARC table which will be maintaine . we can write the execption also with sy-subrc <> o.if it is not maintianed .so far all customizing data fields  this would be the best way for constants maintaining outside your program  .
    Similarly if any system constants then we can get it in runtime  with SYST table parameters .
    if there are any  ABAP Program Constants  ( Titles,labels ,case condition parameters,ect) maintain in the tprogram ext elements , or you can generically maintain a Utility class where you can create an attribute  so that whereeven you want you can reuse the same  .
    Regards,

  • I just purchased the I5, and use the same itunes as my wife. All my wifes contacts showed up on my phone. Is there a way to avoid this?

    I just purchased the I5, and use the same itunes as my wife. All my wifes contacts showed up on my phone. Is there a way to avoid this?

    She needs to call the carrier on her old iPhone and have it removed from her account.
    Once she does that you will not be able to use iMessage because that only works Apple to Apple.
    You will need to use something else like Skype instead.
    Allan

  • When I send an email with Mail, I often confuse the account which I'm using. The result is that I send a message with the wrong account! Is there a way to avoid this (for example a reminder before the email is sent)?

    When I send an email with Mail, I often confuse the account which I'm using. The result is that I send a message with the wrong account! Is there a way to avoid this (for example a reminder before the email is sent)?

    Hi, thanks for the answer, I did that already. Unfortunatly this doesn't help me at all, as I often forget to check the menu. For me composing the message is writing the text, the subject, the person to who is addressed and than press "send".
    I often forget to check the "from", and this is a problem because the software select itself one of the accounts.
    Isn't there a way at least to put as a default a blank field instead of one of the accounts? or an account which doesn't work so if I forget to specify the "from" I will be rnotofied that the message can't be sent.
    I guess this could be a rather common problem for many people!
    Thanks
    Sergio

  • I just planned to install windows 7 on my MBP Mid-2012 using VMware Fusion,so i am bit panic about viruses and malware's affecting through vmware,is there any way to avoid from this??

    i just planned to install windows 7 on my MBP Mid-2012 using VMware Fusion,so i am bit panic about viruses and malware's affecting through vmware,is there any way to avoid from this??

    usamasheikh wrote:
    virus protection in vmware or on my running OS X 10.8.2??plz help me out
    First, you can install Microsoft's Security Essentials in the Win 7 VM and keep it up-to-date. Second, you can turn off Sharing in Fusion's System Settings to keep the VM environment separate from your Mac. Third, you can look into Sophos Anti-Virus http://www.sophos.com/en-us/products/free-tools/sophos-antivirus-for-mac-home-ed ition/download.aspx for the Mac host.

  • Have my MacBook Pro plugged into a monitor and also using a wireless keyboard. I want to close the macBook but every time I do the monitor turns off - is there a way to avoid this?

    Have my MacBook Pro plugged into a monitor and also using a wireless keyboard. I want to close the MacBook but every time I do the monitor turns off - is there a way to avoid this?

    Press any key on the wireless keyboard after you close the MBP and it goes to sleep. The computer will wake up with the external monitor as its display. This is called Clamshell mode.
    http://support.apple.com/kb/HT3131

  • What are the Ways to Avoid Email Tracking using Mail?

    Read KATE MURPHY's article in today's New York Times - "Ways to Avoid Email Tracking".
    I want to do this, but the article was not specific enough to Mail to explain how to do what she suggests in Mail preferences. (see text from article below)
    Any hints from people here?
    Thanx
    There are some things you can do to avoid having your email activity monitored. Perhaps the easiest defense is to adjust the settings of your email program so there is no image rendering.
    It used to be set that way by default but last year, in a boon to marketers, Gmail made the setting an opt-out feature and many other email providers followed suit. Disabling images will sift and block images from incoming emails, including those tiny, pixel-size tracking bugs. You can click on the missing images you want to see and which ones you don’t."

    Nevets,
    In Mail go to Preferences, then to Viewing
    See an option there to turn off remote loading of content
    I leave mine always off using the above dialog box.
    The email will go through to your mail box but the images will not follow unless you click an option in your mail box to load remote images - you can do this for each message.

  • What is the best way to avoid latency when using the io plug in?

    What is the best way to avoid latency when using the io plug in?

    Hi colin a.
    Welcome to the Support Communities!
    The article below may be able to help you with this.  Click on the link to see more details and screenshots. 
    Logic: About I/O buffer size and monitoring latency
    http://support.apple.com/kb/ht1314
    Cheers,
    - Judy

  • I'm using a Canon HV20 video camera that uses digital tape. After importing to my Events Library in Final Cut X, there are some timecode breaks between clips resulting also in gaps between the clips. Is there a way to avoid this?

    I'm using a Canon HV20 video camera that uses digital tape. After importing to my Events Library in Final Cut X, there are some timecode breaks between clips resulting also in gaps between the clips. Is there a way to avoid this?

    Thanks Russ.  I'm a beginner but Lynda.com has a video on making an archive, so I'll follow her video to try this method.

  • Is there a way to avoid having a content library on a site server when the Distribution Point role is not installed on that server (disk cost issue)?

    Hello,
    I don't think it is possible, but my goal is to start a discussion about content libraries and maybe suggest something for a future release or version of Configuration Manager.
    Actually, based on Configuration Manager Technet documentation, Configuration Manager creates a content library on each site server and on each distribution point.
    Often, when designing the architecture, people will offload the distribution point role from the site server to an external server (and add the role to other servers too for redundancy). They could also do the same for the Management Point role, but this
    is not related to content library. The idea is to save the site server from having to deal with clients for software distribution (applications, software updates, OS, etc.), this is especially true for organizations having a large number of clients and/or
    primary site servers involved in a hierarchy. Doing so will allow more resources on the site server to deal with the database and also replication in the case of a hierarchy.
    When doing that, you still have to maintain a content library on the site server and the thing is this library will usually become huge, especially for organizations having more than 1000 applications (add also OS images to this). Will the content library
    on the site server become as huge as the one for a distribution point having a copy of all content? I guess the answer is yes.
    I know that Pull distribution points will help offloading the task from the site server to distribute content to distribution points, but, correct me if I'm wrong, you still have to maintain a content library on the site server when using them, and they
    will not make the content library smaller on the site server. Also, I don't like the fact that you lose the rate limits feature with Pull DPs, but this is another story.
    Storage cost is high and in this scenario, it hurts to have to pay this cost for a content library not used by the clients, but only to distribute content to DPs.
    Correct me if I'm wrong, but the key component here is Distribution Manager on the site server; this is the one which has to maintain a content library to do its job.
    It would be nice if we could have a way to elect a specific distribution point (not on the site server) as the Distribution Manager for a site, that main DP would hold a copy of all content by default, but would be used to distribute content to other DPs
    and avoid the content library on the site server. Said differently, the Distribution Manager component would become a site system role that could be transferred outside the site server.
    Tnx for comments, answers or suggestions.
    Patrick

    There is no way to avoid that the contentlib will be placed on the site server.
    I don‘t agree that storage cost is high. It might be true for fast storage, but that‘s not needed for it.
    Torsten Meringer | http://www.mssccmfaq.de

  • Is there a way to avoid a iPlanet Messaging Express home user to copy from the email message ( email content ) body and paste on to a local place( it Hard disk, for an ex )?

    Is there a way to avoid a iPlanet Messaging Express home user to copy and paste email body content and avoid attachment deliver attempts?Cause this could grant home users to take ownership of enterprise's documents, sending to them selves and after that, in their own homes, they access Messaging Express, recieve their email with the forbbiden content and then copy and paste to it's own's hard disk.

    It may be possible, but then what would prevent the user from running a "screen grabber" to capture the data. The underlying question that you need to ask is, "Who can you trust?" If you're concerned about confidential documents being stolen/disclosed, then that is where your security starts. If someone can't access a document, they can't E-mail it or transport it elsewhere. Who says they can only use E-mail? Using ftp is more efficient, or a floppy/Zip/Jazz drive could also be used. Trying to "secure" the E-mail client would be like plugging a single hole in a water pipe full of leaks. You have to shut off the water at the source.

  • Is there a way I can use the iPhoto maps function within Keynote?

    Hi,
    I recently brought a Macbook Pro, and am having my first go at using Keynote. Having previously played with iPhoto, there is the map function built in, and I was wondering whether there is a way to use this in Keynote?
    I was hoping to avoid using a screenshot of google maps as its not interactive, and plus quite bland too.
    Any way this can be done?
    Thanks,

    Keynote can not interact with other applications other than launch a web browser, it cant display web content within a Keynote presentation.
    The only way Keynote can be used to display a "live" web content is to launch a browser at a specific webpage, Google Maps for example,
    To try this place a shape on the slide, select it then:
    Inspector > Hyperlink > Enable as Hyperlink > link to webpage;  type in the web address in the URL box

  • Avoid using Username and password in SOAP Envelope

    Hi Team
    I am working on calling the sercured web-service from PLSQL and able to call it successfully and get the response.
    In the SOAP envelope, I have header and body.
    Header contains the WS Security which includes username and password to authenticate the web-service and body contains the actual input pay load for service.
    Currently, header has username and password as 'hard-coded', is there a way to avoid the usage of username and password.
    We already tried to SIF for EBS methodology where in following steps are done:
    1) Create and event in EBS.
    2) Pass the event along with payload to SOA.
    3) SOA receives the event and triggers web-service and gets the response.
    4) Pass the response to EBS.
    This technique does avoid usage of username and password but takes 20 seconds to do the job. However, the appraoch above takes hardly 1 second.
    Please let me know in case any one has any idea on how to avoid credentials usage in SOAP envelope.
    Thanks
    Mirza Tanzeel

    How about doing away with that approach entirely?
    Password authentication requires one to keep a secret, secret. And that is the primary problem as how does one safely guard the secret, and manage the secret (by regularly changing)?
    Relying on secrets is a problem. I have never been a fan of password based security.
    Instead:
    a) use HTTPS to secure communication between sender and receiver
    b) use robust firewall rules to ensure that only sender is allowed to communicate with receiver
    c) implement sound network management and exception reporting (to detect and prevent violations on network infrastructure level)
    If you lack in the network infrastructure and administration areas, then:
    a) make the web service endpoint on server on localhost only (do not expose it to the outside world)
    b) establish a trusted ssh connection between sender and receiver using strongly encrypted RSA/DSA keys
    c) configure sender with a service that opens a reverse tunnel to target, exposing the web service as a local port on its localhost

  • How can I avoid using rollback segment for batch updates.

    I am currently trying to avoid associating a large amount of space for rollback segment as this gets filled up only during the nightly batch updates. All that space will never be used during the day. Hence want to know if there is any way of avoiding the use of rollback segment at the session level.
    Rajesh

    No, but what you can do is create a large rollback segment to use with your batch job, at the start of your batch job bring the segment online, then use set transaction to use that rollback segment, when the batch job is finished and committed, you can then bring the rollback segment offline.
    If you are really pressed for space, as an alternate plan, you could actually create the large segment before the batch job and drop it after.

Maybe you are looking for