全文获取类型
收费全文 | 892篇 |
免费 | 96篇 |
国内免费 | 60篇 |
专业分类
测绘学 | 131篇 |
大气科学 | 105篇 |
地球物理 | 67篇 |
地质学 | 173篇 |
海洋学 | 62篇 |
天文学 | 2篇 |
综合类 | 124篇 |
自然地理 | 384篇 |
出版年
2024年 | 14篇 |
2023年 | 23篇 |
2022年 | 47篇 |
2021年 | 41篇 |
2020年 | 44篇 |
2019年 | 41篇 |
2018年 | 37篇 |
2017年 | 54篇 |
2016年 | 45篇 |
2015年 | 38篇 |
2014年 | 71篇 |
2013年 | 65篇 |
2012年 | 43篇 |
2011年 | 63篇 |
2010年 | 71篇 |
2009年 | 44篇 |
2008年 | 61篇 |
2007年 | 37篇 |
2006年 | 68篇 |
2005年 | 45篇 |
2004年 | 24篇 |
2003年 | 17篇 |
2002年 | 27篇 |
2001年 | 8篇 |
2000年 | 8篇 |
1999年 | 2篇 |
1998年 | 4篇 |
1997年 | 2篇 |
1994年 | 1篇 |
1992年 | 1篇 |
1987年 | 2篇 |
排序方式: 共有1048条查询结果,搜索用时 31 毫秒
161.
针对高维数据包含的不相关和冗余特征影响检测方法性能的问题,提出了基于遗传神经网络入侵特征选择模型.该模型在传统的遗传神经网的输入层和隐含层之间增加特征选择层,并在特征选择层与输入层间设置连接开关,如果开关合上,则该特征被选中;否则为放弃.实验结果表明,该模型在保持原有信息完整性的同时,能有效减少冗余特性;在保证检测准确率的前提下,有效提高系统的检测速度. 相似文献
162.
地理信息服务特别是WMS和WFS获得广泛应用的同时,存在空间数据的安全隐患.为保证地理信息服务请求/响应消息交互的安全,实现服务访问及数据获取的分级控制,保护空间数据版权,提出了基于数字证书、GeoXACML和数字水印的地理信息服务数据安全机制,并通过数字证书、访问控制、版权管理3个核心模块对数据安全系统进行描述. 相似文献
163.
基于C/S与B/S混合结构的海洋科技档案管理系统的分析和设计 总被引:1,自引:0,他引:1
分析了目前海洋科技档案管理的现状和存在的问题,针对海洋科技档案管理的特点和具体的应用需求,提出了基于C/S与B/S混合结构的海洋科技档案管理系统(Marine Science&Technology Archives Management System,MSTAMS)设计方案.基于海洋科技档案管理的工作流程,从系统的总体设计、数据库设计、功能模块划分以及安全管理体束等方面进行了论述,对其中的关键技术进行了分析和研究,为糸纯的开发和实施提供一套切实、可行、全面、先进的理论体来和技术指导,以实现海洋科技档案管理信息化、自动化和可视化,从而提高海洋科技档案管理的效率,满足目前各海洋研究系统及单位对档案管理和应用的需要. 相似文献
164.
165.
随着W ebGIS的不断深入、发展应用,基于行业级的W ebGIS系统已深入到了政府、事业及大型企业。系统中除了大量的地理信息外,还存储着单位业务系统(OA/M IS)重要的技术和专题信息。系统内联办公自动化局域网络,外联因特网,在网络上进行着大量的重要信息交流。系统安全问题在信息系统整个生命周期过程中显得非常重要,本文论述了如何制定系统完善的安全计划和安全管理,为行业的信息安全工作提供具体的指导,提高行业信息系统的整体安全水平。 相似文献
166.
基于WS-Security的安全动态电子商务 总被引:1,自引:0,他引:1
Web服务方式的动态电子商务是电子商务的最终目标,安全问题是制约动态电子商务实现的主要因素。在介绍了WS-Security规范后,给出了一个建立动态电子商务的案例,分析了这个过程中可能面临的安全风险,提出了一种如何实现电子商务中重要的机密性、完整性问题的方法。 相似文献
167.
LI Fadong LENG Peifang ZHANG Qiuying SONG Shuai QIAO Yunfeng GU Congke ZHANG Qian WU Liang Mulubrhan Balehegn Dagne Mojo ZHU Nong ZHAO Xin 《资源与生态学报(英文版)》2018,9(3):237-249
Food security and sustainable agricultural development are the hot issues of scientific research, especially after the population affected by hunger surprisingly increased in 2016. Long-lasting and recurrent famines caused by natural disasters and wars have afflicted Ethiopia. Unlike Ethiopia, which is still struggling to achieve food self-sufficiency, China managed to quickly become food self-sufficient at a rapid speed, despite the fact that it also faced the same challenges of famine over the last century. In the backdrop of differing environmental and socio-political challenges the two countries face, comparing the similarities and differences between the two countries will yield important lessons and insights for Ethiopia to follow to achieve food self-sufficiency. Here, the progress towards food security in Ethiopia and China is presented to quantitatively compare the gap of agricultural production between both countries. We found that food production in Ethiopia is heavily constrained by drought, soil degradation, climate change, out-dated agricultural production technologies, and poverty. According to these challenges, we examined corresponding responses in China to propose solutions for achieving food self-sufficiency in Ethiopia, given the realities of its unique national situation. 相似文献
168.
地理信息数据是国家国防建设和国民经济发展的重要基础数据,随着数字化、信息化及云计算等技术的发展,地理信息数据的安全威胁日益严峻,本文面对移动平台上地理信息数据安全存储、高效传输和实时信息解密及处理等挑战,提出了一种基于TEA算法的地理信息数据安全保护技术,该技术采用循环迭代的移位和异或运算实现对地理信息数据的加密和解密,可以实现移动平台端地理信息数据的高安全加密存储和高性能实时解密处理,并采用该算法对SRTM数据进行处理和分析。试验结果表明,基于TEA算法的地理信息数据加密技术可以有效实现地理信息数据的加密及解密处理,满足移动系统对地形数据的高安全存储和高性能处理的要求。 相似文献
169.
Potential promoted productivity and spatial patterns of medium- and low-yield cropland land in China 总被引:1,自引:1,他引:1
With a continuously increasing population and better food consumption levels, improving the efficiency of arable land use and increasing its productivity have become fundamental strategies to meet the growing food security needs in China. A spatial distribution map of medium- and low-yield cropland is necessary to implement plans for cropland improvement. In this study, we developed a new method to identify high-, medium-, and low-yield cropland from Moderate Resolution Imaging Spectroradiometer (MODIS) data at a spatial resolution of 500 m. The method could be used to reflect the regional heterogeneity of cropland productivity because the classification standard was based on the regionalization of cropping systems in China. The results showed that the proportion of high-, medium-, and low-yield cropland in China was 21%, 39%, and 40%, respectively. About 75% of the low-yield cropland was located in hilly and mountainous areas, and about 53% of the high-yield cropland was located in plain areas. The five provinces with the largest area of high-yield cropland were all located in the Huang-Huai-Hai region, and the area amounted to 42% of the national high-yield cropland area. Meanwhile, the proportion of high-yield cropland was lower than 15% in Heilongjiang, Sichuan, and Inner Mongolia, which had the largest area allocated to cropland in China. If all the medium-yield cropland could be improved to the productive level of high-yield cropland and the low-yield cropland could be improved to the level of medium-yield cropland, the total productivity of the land would increase 19% and 24%, respectively. 相似文献
170.
《Geoforum》2015
The life of those seeking asylum from persecution and other human rights abuses has become interminably precarious. As minority world governments deploy various apparatuses of security to govern the circulation of ‘unruly’ populations, the world’s most vulnerable people have been reconstituted as security threats. In this paper I trace this ‘transfer of illegitimacy’ and criminalisation of asylum seeker bodies in the context of the Australian government’s newly deployed Operation Sovereign Borders. Drawing on Foucault’s governmentality as a domain of security and Butler’s articulation of recognition, precariousness and grievability, I explore both the subjectivities formed as a function and technique of securing Australia’s borders and the way this framing produces a certain governed reality that ‘acts upon the senses’ to delimit public discourse. I argue that the range of discursive and non-discursive practises that make up Operation Sovereign Borders has dire implications for those seeking asylum in Australia. Not only do these practises constitute a social crafting where conditions for a flourishing life are diminished, but this crafting of precarity is carried out in the name of securing citizens lives. The life of the asylum seekers is a life unrecognised in the violent frames of Operation Sovereign Borders. 相似文献