首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2614篇
  免费   21篇
公路运输   415篇
综合类   885篇
水路运输   818篇
铁路运输   131篇
综合运输   386篇
  2024年   2篇
  2023年   6篇
  2022年   22篇
  2021年   31篇
  2020年   22篇
  2019年   15篇
  2018年   339篇
  2017年   296篇
  2016年   262篇
  2015年   22篇
  2014年   39篇
  2013年   41篇
  2012年   108篇
  2011年   267篇
  2010年   265篇
  2009年   104篇
  2008年   231篇
  2007年   184篇
  2006年   60篇
  2005年   89篇
  2004年   70篇
  2003年   76篇
  2002年   30篇
  2001年   9篇
  2000年   12篇
  1999年   6篇
  1998年   6篇
  1997年   2篇
  1996年   9篇
  1995年   3篇
  1994年   1篇
  1993年   1篇
  1991年   3篇
  1990年   2篇
排序方式: 共有2635条查询结果,搜索用时 406 毫秒
121.
In the connected vehicles, connecting interfaces bring threats to the vehicles and they can be hacked to impact the vehicles and drivers. Compared with traditional vehicles, connected vehicles require more information transfer. Sensor signals and critical data must be protected to ensure the cyber security of connected vehicles. The communications among ECUs, sensors, and gateways are connected by in-vehicle networks. This paper discussed the state-of-art techniques about secure communication for in-vehicle networks. First, the related concepts in automotive secure communication have been provided. Then we have compared and contrasted existing approaches for secure communication. We have analyzed the advantages/disadvantages of MAC and digital signatures for message authentication and compared the performance and limitations of different cryptographic algorithms. Firewall and intrusion detection system are introduced to protect the networks. The constraints and features of different intrusion detection approaches are presented. After that, the technical requirements for cryptographic mechanism and intrusion detection policy are concluded. Based on the review of current researches, the future development directions of the automotive network security have been discussed. The purpose of this paper is to review current techniques on automotive secure communication and suggest suitable secure approaches to implement on the in-vehicle networks.  相似文献   
122.
When using limited funds on bicycle facilities, it would be helpful to know the extent to which a new facility will be used. If a bicycle lane is added to a street, how many bicyclists will no longer use the adjacent sidewalk? If a separate bicycle path is constructed, how many bicyclists will move from the street or sidewalk? This study seeks to identify factors that explain a bicyclist’s choice between available facility choices—off-street (sidewalk and bicycle path) or on-street (bicycle lane and roadway). This paper investigates these issues through a survey of bicyclists headed to Purdue University in West Lafayette, IN, USA. The first data collected to address these questions were “site-based”. Bicyclists were interviewed on campus at the end of their trips and asked which part of the cross-sections along their routes they had used—on-street or off-street. The characteristics of a particular cross-section of street right-of-way were then compared against the characteristics of each bicyclist and his/her observed choice of street, sidewalk, lane, or path. Later, “route-based” serial data were also added. The study developed a mixed logit model to analyze the bicyclists’ facility preferences and capture the unobserved heterogeneity across the population. Effective sidewalk width, traffic signals, segment length, road functional class, street pavement condition, and one-way street configuration were found to be statistically significant. A bicycle path is found to be more attractive than a bicycle lane. Predictions from the model can indicate where investments in particular bicycle facilities would have the most desirable response from bicyclists.  相似文献   
123.
It has always been a daunting task for any government to allocate the budgets for public infrastructure effectively so as to maximize the benefits of the limited resources. The most important contribution this paper makes is to conduct an empirical study of the budget allocations of the six region-based road system construction plans in northern Taiwan using the transportation budget allocation model devised in this paper. After reviewing the results, the experts consulted while preparing this paper believe that these results are both objective and able to meet the actual requirements. The competent authority also believes that they are better than those obtained using their original approach. In particular, the construction of this model takes into consideration the highest-level supervisors. To a certain degree, it caters for the practices in budget allocation so that the managers are able to assume the authority corresponding to their responsibility concerning management efficiency and final outcomes.  相似文献   
124.
The objective of this study was to investigate the performance of a model azimuthing podded propulsor in ice-covered water. Model tests were carried out with two different depths of cut into the ice (15 and 35 mm), two different ice conditions (presawn and pack ice conditions), and four different azimuthing angles. The depth of cut is the maximum penetration depth of the propeller blade into the ice block. The 0.3-m-diameter model propeller was operated in a continuous ice milling condition. Ice loads were measured by several sensors which were installed in various positions on the model. Six one-axis pancake-style load cells on the top of the model measured the global loads and two six-component dynamometers were installed on the shaft to measure the shaft loads. One six-component dynamometer was attached to the one of the propeller blades inside the hub to measure the blade loads. The pod unit and propeller performance in ice are presented. Ice-related loads, which were obtained when the blade was inside the ice block, are introduced and discussed. During the propeller–ice interaction, a blade can experience the path generated by the previous blade, which is called the shadowing effect. The effects of shadowing, depth of cut, azimuthing angle, and advance coefficient on propulsor performance are presented and discussed.  相似文献   
125.
This paper presents a discussion of the characteristics of ship waves in a narrow channel restricted by vertical walls, based on observed data and the results computed by a 2-D model. In the numerical model, the propagation of waves generated by a moving ship is simulated by solving 2-D depth-integrated Boussinesq equations. To get the boundary conditions at the location of the ship, the slender-ship approximation is employed. A field observation was carried out at a straight length of navigation channel. The ships targeted in the observations are two kinds of waterbuses with lengths of 28 and 24 m. The relative depth Froude number for the river current, an appropriate parameter for assessing the influence of the current on ship wave characteristics in a navigation channel, ranged from 0.47 to 0.76. The observed maximum wave height varied between 0.13 and 1.26 m. The maximum wave height of the wave train is sharply increased when the relative depth Froude number exceeds 0.6. The results computed by the present model agree fairly well with the observed data.  相似文献   
126.
This paper provides an analysis of trip generation of three vulnerable groups: single-parent families, low income households, and the elderly. It compares the mobility of these groups to that of the general population in three Canadian urban areas of Hamilton, Montreal and Toronto, based on data from large-sample metropolitan transport surveys. An ordered probit model with spatially expanded coefficients is used for the analysis. Spatial expansion shows that there are spatial mobility trends for elderly populations and low-income populations even after socio-economic attributes are accounted for. Such spatial differences are not generally found for single parent families. This novel spatial analysis provides clues as to where vulnerable populations may experience greater degrees of social exclusion. It provides information to help prioritize transportation infrastructure projects or other social programs to take into account the needs of vulnerable populations with the lowest levels of mobility.  相似文献   
127.
基于SPH方法的波浪对水平板冲击的数值模拟(英文)   总被引:1,自引:0,他引:1  
A numerical model was established for simulating wave impact on a horizontal deck by an improved incompressible smoothed particle hydrodynamics (ISPH). As a grid-less particle method, the ISPH method has been widely used in the free-surface hydrodynamic flows with good accuracy. The improvement includes the employment of a corrective function for enhancement of angular momentum conservation in a particle-based calculation and a new estimation method to predict the pressure on the horizontal deck. The simulation results show a good agreement with the experiment. The present numerical model can be used to study wave impact load on the horizontal deck.  相似文献   
128.
康高亮 《中国铁路》2010,(12):29-33
分析在覆盖区域大、地质复杂的条件下,中国高速铁路工务工程"高可靠性、高稳定性、高平顺性"的技术特点,针对路网规模大、运营速度高、行车密度大的特征,围绕高速铁路运营的"安全、舒适、秩序",研究提出工务设备管理维护模式,在高速铁路安全运营实践的基础上,提出适合中国高速铁路工务设备检查、监控、修理的对策。  相似文献   
129.
早餐每天都在吃,怎样吃才最健康却是门学问. 先喝水再早餐起床后先喝杯清水然后再吃早餐比较好.这是因为在夜间的睡眠中,人体大部分器官都得到了充分休息,惟独消化器官仍在消化、吸收晚餐留在胃肠道中的食物,到凌晨才真正进入休息状态.如果早餐吃得过早,就会影响胃肠道的休息.  相似文献   
130.
<正>五羊——本田优客(上接2014年第1期)五羊——本田优客有2款车型,分别是普通款的(STD)型和集中制动款的(HGBS)型,图5为普通型的电起动电路原理图。蓄电池正电源通过主保险后,由输出端红/白色(R/W)线进入点火保险和电源继电器的触点一端。电源由点火保险输出端黑/蓝色(B1/Bu)线进入电门锁,打开电门锁后,电源由黑/白色(B1/W)线进入起动继电器的线圈一端、ECM和电源继电器的线圈一端。电源继电器线圈另一端为固定搭铁的绿色线,电源继电器线圈得电吸合触点,电源由触点另一端红/黄色(R/Y)线进入信号保险。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号