首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3168篇
  免费   7篇
公路运输   839篇
综合类   693篇
水路运输   984篇
铁路运输   33篇
综合运输   626篇
  2023年   10篇
  2022年   20篇
  2021年   9篇
  2020年   9篇
  2019年   9篇
  2018年   369篇
  2017年   327篇
  2016年   362篇
  2015年   11篇
  2014年   35篇
  2013年   159篇
  2012年   127篇
  2011年   345篇
  2010年   333篇
  2009年   91篇
  2008年   268篇
  2007年   145篇
  2006年   11篇
  2005年   69篇
  2004年   59篇
  2003年   60篇
  2002年   31篇
  2001年   10篇
  2000年   16篇
  1999年   10篇
  1998年   24篇
  1997年   16篇
  1996年   19篇
  1995年   18篇
  1994年   5篇
  1993年   7篇
  1992年   12篇
  1991年   8篇
  1990年   12篇
  1989年   8篇
  1988年   5篇
  1987年   9篇
  1986年   8篇
  1985年   8篇
  1984年   9篇
  1983年   12篇
  1982年   8篇
  1981年   12篇
  1980年   8篇
  1979年   16篇
  1977年   15篇
  1976年   12篇
  1975年   12篇
  1974年   9篇
  1973年   6篇
排序方式: 共有3175条查询结果,搜索用时 375 毫秒
101.
Carsharing is a vehicle sharing service for those with occasional need of private transportation. Transportation planners are beginning to see great potential for carsharing in helping to create a more diversified and sustainable transport system. While it has grown quickly in the US in recent years, it is still far from the level where it can deliver significant aggregate benefits. A key element to the potential growth of carsharing is its ability to provide cost savings to those who adopt it in favor of vehicle ownership. This research seeks to quantify these potential cost savings. The costs of carsharing and vehicle ownership are compared based on actual vehicle usage patterns from a large survey of San Francisco Bay Area residents. The results of this analysis show that a significant minority of Bay Area households own a vehicle with a usage pattern that carsharing could accommodate at a lower cost. Further research is required to indentify how these cost savings translate to the adoption of carsharing.  相似文献   
102.
A digital signature with message recovery is a signature that the message itself (or partial of the message) is not required to be transmitted together with the signature. It has the advantage of small data size of communication comparing with the traditional digital signatures. In this paper, combining both advantages of the message recovery signatures and the certificateless cryptography, we propose the first certificatelss signature scheme with message recovery. The remarkable feature of our scheme is that it can achieve Girault’s Level-3 security while the conventional certificateless signature scheme only achieves Level-2 security. The security of the scheme is rigorously proved in the random oracle model based on the hardness of the k bilinear Diffie-Hellman inverse (k-BDHI) problem.  相似文献   
103.
R. D. Coombe 《运输评论》2013,33(3):217-234

The mid‐1970s saw the initiation of several lengthy research and development programmes in the United Kingdom which culminated in a range of software for the traffic engineer. The early 1980s brought cheap, powerful microcomputers, thereby enabling the facilities offered by the software to be exploited to the full. This article describes the range of programs now available and in common usage for the design and appraisal of traffic management schemes in the United Kingdom, and suggests a few of the areas where some research and development effort is still needed.  相似文献   
104.
User selection is necessary for multiuser multiple-input multiple-output (MIMO) downlink systems with block diagonalization (BD) due to the limited free spatial transmit dimensions. The pure user selection algorithms can be improved by performing receive antenna selection (RAS) to increase sum rate. In this paper, a joint user and antenna selection algorithm, which performs user selection for sum rate maximization in the first stage and then performs antenna selection in the second stage, is proposed. The antenna selection process alternately drops one antenna with the poorest channel quality based on maximum determinant ranking (MDR) from the users selected during the first stage and activates one antenna with the maximum norm of projected channel from the remaining users. Simulation results show that the proposed algorithm significantly outperforms the algorithm only performing user selection as well as the algorithm combining user selection with MDR receive antenna selection in terms of sum rate.  相似文献   
105.
Of different model-based methods in vision based human tracking, many state of the art works focus on the stochastic optimization method to search in a very high dimensional space and try to find the optimal solution according to a proper likelihood function. Seldom works perform a framework of interactive multiple models (IMM) to track a human for challenging problems, such as uncertainty of motion styles, imprecise detection of feature points and ambiguity of joint location. This paper presents a two-layer filter framework based on IMM to track human motion. First, a method of model based points location is proposed to detect key feature points automatically and the filter in the first layer is performed to estimate the undetected points. Second, multiple models of motion are learned by the prior motion data with ridge regression and the IMM algorithm is used to estimate the quaternion vectors of joints rotation. Finally, experiments using real images sequences, simulation videos and 3D voxel data demonstrate that this human tracking framework is efficient.  相似文献   
106.
This research seeks to improve the understanding of the full range of determinants for mode choice behavior and to offer practical solutions to practitioners on representing and distinguishing these characteristics in travel demand forecasting models. The principal findings were that the representation of awareness of transit services is significantly different than the underlying assumption of mode choice and forecasting models that there is perfect awareness and consideration of all modes. Furthermore, inclusion of non-traditional transit attributes and attitudes can improve mode choice models and reduce bias constants. Additional methods and analyses are necessary to bring these results into practice. The work is being conducted in two phases. This paper documents the results of Phase I, which included data collection for one case study city (Salt Lake City), research and analysis of non-traditional transit attributes in mode choice models, awareness of transit services, and recommendations for bringing these analyses into practice. Phase II will include data collection for two additional case study cities (Chicago and Charlotte) with minor modifications based on limitations identified in Phase I, additional analyses where Phase I results indicated a need, and a demonstration of the research in practice for at least one case study city.  相似文献   
107.
The aim of this study was to assess proof of concept and usability of a maritime service website prototype in a full-mission ship bridge simulator through Swedish mariners’ experiences and perceptions. This test was part of the European Commission’s EfficienSea2 project for e-navigation. The prototype was intended as an aid to existing standard systems and methodologies for planning, executing and monitoring voyages. The study began with 5 days of simulator trials focused on today’s standard practices. This served as a baseline to compare to subsequent 4 days of simulator trials testing the prototype. For data collection, observations, video footage, interviews, and eye tracking were used. Data analysis included breaking apart the qualitative data to capture the perceptions of the participants, and a preliminary analysis of eye-tracking data as a complement. The results suggested that the prototype could be more suitable for a route planning stage, that the participants were familiar with similar existing solutions from other manufacturers, and that the contents of the tool would be most beneficial if integrated within the Electronic Chart Display and Information Systems (ECDIS). There is a pressing need for the novel solutions to be user needs-driven, integrated with the existing technologies, and standardized across the domain, and these processes must go hand-in-hand with accounting for all involved stakeholders, procedures, regulations, and training, as this will alter the course of shipping.  相似文献   
108.
Risk analysis in seaports plays an increasingly important role in ensuring port operation reliability, maritime transportation safety and supply chain distribution resilience. However, the task is not straightforward given the challenges, including that port safety is affected by multiple factors related to design, installation, operation and maintenance and that traditional risk assessment methods such as quantitative risk analysis cannot sufficiently address uncertainty in failure data. This paper develops an advanced Failure Mode and Effects Analysis (FMEA) approach through incorporating Fuzzy Rule-Based Bayesian Networks (FRBN) to evaluate the criticality of the hazardous events (HEs) in a container terminal. The rational use of the Degrees of Belief (DoB) in a fuzzy rule base (FRB) facilitates the implementation of the new method in Container Terminal Risk Evaluation (CTRE) in practice. Compared to conventional FMEA methods, the new approach integrates FRB and BN in a complementary manner, in which the former provides a realistic and flexible way to describe input failure information while the latter allows easy updating of risk estimation results and facilitates real-time safety evaluation and dynamic risk-based decision support in container terminals. The proposed approach can also be tailored for wider application in other engineering and management systems, especially when instant risk ranking is required by the stakeholders to measure, predict and improve their system safety and reliability performance.  相似文献   
109.
The coastal zone is attractive for human settlement because it tends to be resource rich, providing a good location to generate incomes and livelihoods. Equally, however, it is a complex and powerful natural environment, which means that the coastal zone often becomes a focus of conflict with multiple users competing for limited space and resources. Understanding the causes of, and determining solutions to, the ensuing problems requires inputs from a range of analyses across sectors and disciplines. However, different disciplinary and sectoral approaches frequently use different investigative methods, language, and means of presenting results. This article presents a framework that has been developed in collaboration with Indian institutions over the past three years in an effort to address some of these fundamental problems of analysis and translation into policy action. Key components addressed by the framework are strengthening the capacity to practice, knowing how to proceed and how to find out what needs to be known using experience-based problem solving.  相似文献   
110.
Radar target signals and chaff cloud jamming signals have different characters by the wavelet transform. The wavelet coefficients of radar target signals are highly correlated with its near-and-near-scale wavelet coefficients, however the correlativity between the wavelet coefficients of chaff cloud jamming signals and its near-and-near scale wavelet coefficients is less significant. Based on the binary-base discrete wavelet transform and the correlation algorithm, the method of target entropy to estimate standard variance of the jamming signals and each scale is proposed to ensure reasonable threshold, to suppress chaff cloud signals and finally to reconstruct mixed signals by the improved spatially selective noise filtration (ISSNF) method. The extensive simulation results show that the proposed method can availably suppress chaff cloud jamming and decontaminate target echo.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号