首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3518篇
  免费   23篇
公路运输   687篇
综合类   755篇
水路运输   1168篇
铁路运输   74篇
综合运输   857篇
  2023年   18篇
  2022年   43篇
  2021年   25篇
  2020年   15篇
  2019年   15篇
  2018年   382篇
  2017年   322篇
  2016年   301篇
  2015年   27篇
  2014年   80篇
  2013年   233篇
  2012年   136篇
  2011年   282篇
  2010年   295篇
  2009年   138篇
  2008年   256篇
  2007年   161篇
  2006年   60篇
  2005年   94篇
  2004年   67篇
  2003年   86篇
  2002年   46篇
  2001年   25篇
  2000年   24篇
  1999年   29篇
  1998年   35篇
  1997年   27篇
  1996年   23篇
  1995年   20篇
  1994年   8篇
  1993年   14篇
  1992年   19篇
  1991年   19篇
  1990年   11篇
  1989年   16篇
  1988年   12篇
  1987年   9篇
  1985年   20篇
  1984年   11篇
  1983年   12篇
  1982年   10篇
  1981年   12篇
  1980年   14篇
  1979年   11篇
  1978年   11篇
  1977年   15篇
  1976年   10篇
  1975年   11篇
  1974年   15篇
  1972年   7篇
排序方式: 共有3541条查询结果,搜索用时 296 毫秒
741.
AbstractCopy deterrence is a digital watermarking application which enables a seller to identify the buyers who obtain digital content legally but illegally redistribute it. However, in many buyer-seller watermarking protocols proposed for copy deterrence, the seller has to embed two watermarks into each copy of the digital content before it is sold. In this paper, we propose a new buyer-seller watermarking protocol in which the seller can reduce the number of the embedded watermarks from two to one. The proposed protocol also provides a more efficient solution to the unbinding problem than that of Lei et al’s scheme.  相似文献   
742.
Aiming to the puzzle that the inner load of nonlinear synthesis transmission system is difficult to obtain, a new kind of virtual prototype establishment and simulation method is put forward. The influence on nonlinear vibration with flexible rotor, bearing backlash is analyzed based on a virtual prototype. To validate the virtual prototype of nonlinear gear transmission system, the corresponding test platform is established. The consistency between simulation results and test results proves that the simulation results of the virtual prototype can be used to calculate the fatigue reliability life of key components. A new kind of fatigue reliability life prediction method of gear system considering multi-random parameter distribution is put forward based on the fatiguestatistic theory. Considering the periodicity of gear meshing, linear interpolation method is adopted to obtain the stress-time course of random load spectrum based on the gear’s complicated torque provided by virtual prototype. The gear’s P-Sa-Sm-N curved cluster can be simulated based on material’s P-S-N curve. The simulation process considers the parameter distributions of stress concentration coefficients, dimension coefficients and surface quality treatment coefficients, and settles the puzzle that traditional test methods cannot acquire the gear’s fatigue life of all reliability levels. This method can provide the distribution function and the interval of fatigue reliability life of gear’s danger region, and has a guide meaning for the gear maintenance periods determination and reliability evaluation.  相似文献   
743.
针对矮塔混凝土斜拉桥结构受力特点,依据影响矩阵调值原理,应用MIDAS/CIVIL2010"未知荷载系数"模块,对常熟常浒河混凝土矮塔斜拉桥工程进行了成桥索力优化。分析结果表明,该方法可以方便地得到满足设计要求的合理成桥索力,且便于施工过程索力优化与结构内力的控制。  相似文献   
744.
The ability of dynamic contrast enhanced magnetic resonance imaging(DCE MRI) with a new devised animal surface coil was analyzed in identifying atherosclerotic plaques in the rabbit medium-sized iliac artery(IA).Then a comparative analysis of multi-detector computed tomography(MDCT) and DCE MRI was done in discerning morphology and components of 80 atherosclerotic plaques identified by histopathology.It shows that the DCE MRI may be an emerging noninvasive and economic way to characterize atherosclerotic plaques at present.What's more, a new devised animal surface coil would further improve the signal-to-noise ratio(SNR) and the quality of imaging.However, CT angiography(CTA) may be better than MR angiography(MRA) in detecting vessel stenosis.  相似文献   
745.
Hepatic computed tomography(CT) images with Gabor function were analyzed.Then a threshold-based classification scheme was proposed using Gabor features and proceeded with the retrieval of the hepatic CT images.In our experiments, a batch of hepatic CT images containing several types of CT findings was used and compared with the Zhao's image classification scheme, support vector machines(SVM) scheme and threshold-based scheme.  相似文献   
746.
Granular effect of fly ash repairs damage of recycled coarse aggregate   总被引:1,自引:0,他引:1  
Repairing effect of fly ash (FA) on damage of recycled coarse aggregate was evaluated by characteristics of pores and cracks in the vicinity of interracial transition zone (ITZ). The interracial structure between the virgin aggregate and the attached old mortar was investigated and compared with ITZ of recycled aggregate concrete in the presence of FA or ultra-fine FA(UFA) by means of scanning electron microscope (SEM). Diam- eter and plumpness frequency distribution of pores as well as width of the old ITZ, length of contacting points and cracks density were analyzed. The SEM results reveal that the diameter of pores is decreases significantly but pores plumpness increases. A decreased ITZ width and cracks density as well as an increased bonding zone length can also been observed, which indicates that FA or UFA repairs damage of recycled coarse aggregate due to its granular effect.  相似文献   
747.
An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, both of which make an exchange protocol more practical. The scheme is unconditionally secure against the cheating signer, its security against the cheating verifier is reduced to the computational Diffie-Hellman (CDH) problem in the underlying group, it is secure against the cheating trusted third party if the underlying Paterson Schuldt's identity based signature (IBS) scheme is secure, which is proven true based on the CDH assumption in the standard model.  相似文献   
748.
Applications on iterative control and multiple input multiple output (MIMO) system were developed. Two new charts derived from extrinsic information transfer (EXIT) chart were employed as the designing tools, which are called as output mutual information chart with defined iterative degree (DID) chart and near optimum output mutual information (NOMI) chart respectively. Different from the EXIT chart, they can show the iterative performance on the whole signal-to-noise ratio range with one single curve, whereas computation complexity is greatly reduced compared with conventional bit error ratio (BER) performance curve. The iterative control was implemented according to a near-optimum iterative degree vector determined by NOMI chart, the reasonability of uncertain parameters was analyzed in one MIMO system. The concepts were illustrated based on bit-interleaved coded modulation with iterative decoding (BICM-ID).  相似文献   
749.
Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworthiness that is based on the knowledge related to the peer's identity, while identity privacy is usually achieved by hiding such knowledge. A trust model based on trusted computing (TC) technology was proposed to enhance the identity privacy of peers during the trustworthiness evaluation process between peers from different groups. The simulation results show that, the model can be implemented in an efficient way, and when the degree of anonymity within group (DAWG) is up to 0.6 and the percentage of malicious peers is up to 70%7 the service selection failure rate is less than 0.15.  相似文献   
750.
Linux has a special feature of automount in the Linux kernel. Filesystem can be mounted and unmounted automatically. Its performance is similar to MS Windows. It works well under demands of more saving resources and automatization, like memory of system. An approach to install/update software automatically on embedded platform was proposed. This approach derives from above feature based on embedded environment with Linux OS. Configurations of files related to this feature were introduced. An example in practice was given to realize this approach from universal serial bus (USB) memory disk when USB disk is available.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号