全文获取类型
收费全文 | 3518篇 |
免费 | 24篇 |
专业分类
公路运输 | 687篇 |
综合类 | 755篇 |
水路运输 | 1169篇 |
铁路运输 | 74篇 |
综合运输 | 857篇 |
出版年
2023年 | 18篇 |
2022年 | 43篇 |
2021年 | 25篇 |
2020年 | 16篇 |
2019年 | 15篇 |
2018年 | 382篇 |
2017年 | 322篇 |
2016年 | 301篇 |
2015年 | 27篇 |
2014年 | 80篇 |
2013年 | 233篇 |
2012年 | 136篇 |
2011年 | 282篇 |
2010年 | 295篇 |
2009年 | 138篇 |
2008年 | 256篇 |
2007年 | 161篇 |
2006年 | 60篇 |
2005年 | 94篇 |
2004年 | 67篇 |
2003年 | 86篇 |
2002年 | 46篇 |
2001年 | 25篇 |
2000年 | 24篇 |
1999年 | 29篇 |
1998年 | 35篇 |
1997年 | 27篇 |
1996年 | 23篇 |
1995年 | 20篇 |
1994年 | 8篇 |
1993年 | 14篇 |
1992年 | 19篇 |
1991年 | 19篇 |
1990年 | 11篇 |
1989年 | 16篇 |
1988年 | 12篇 |
1987年 | 9篇 |
1985年 | 20篇 |
1984年 | 11篇 |
1983年 | 12篇 |
1982年 | 10篇 |
1981年 | 12篇 |
1980年 | 14篇 |
1979年 | 11篇 |
1978年 | 11篇 |
1977年 | 15篇 |
1976年 | 10篇 |
1975年 | 11篇 |
1974年 | 15篇 |
1972年 | 7篇 |
排序方式: 共有3542条查询结果,搜索用时 15 毫秒
871.
Dimitris Potoglou Neil Robinson Chong W. Kim Peter Burge Richard Warnes 《Transportation Research Part A: Policy and Practice》2010,44(3):169-181
Public transport systems have been targets in several terrorist attacks, notably in recent years, resulting in tight security measures worldwide. However, individuals’ privacy and liberty often conflict with efforts towards safety and security, making it difficult to assess the implications of security measures balanced against the costs (e.g., citizens may be stopped, searched and asked to provide personal identification data to authorities without any particular reason). Henceforth, our research question asks, “to what extent would people sacrifice their right to privacy and liberty in exchange for potentially safer and more secure travel?” This paper uses a stated choice experiment to quantify individuals’ trade-offs between privacy and security within a real-life context, namely rail travel in the UK. Using a nationwide sample, the empirical analysis yields the importance of improvements in the security infrastructure and identifies areas of concern with regard to privacy and liberty controlling for travel related factors. Further, trade-offs across different security measures for rail travel are quantified in terms of individuals’ willingness-to-pay extra on top of the average ticket price. 相似文献
872.
873.
A directed signature is a type of signature with restricted verification ability. Directed signatures allow only a designated
verifier to check the validity of the signature issued to him, and at the time of trouble or if necessary, any third party
can verify the signature with the help of the signer or the designated verifier. Directed signature schemes are widely used
in situations where the receiver’s privacy should be protected. Proxy signatures allow an entity to delegate its signing capability
to another entity in such a way that the latter can sign message on behalf of the former when the former is not available.
Proxy signature schemes have found numerous practical applications such as distributed systems and mobile agent applications.
In this paper, we firstly define the notion of the directed proxy signature by combining the proxy signature and directed
signature. Then, we formalize its security model and present a concrete scheme in the standard model. Finally, we use the
techniques from provable security to show that the proposed scheme is unforgeable under the gap Diffie-Hellman assumption,
and invisible under the decisional Diffie-Hellman assumption. 相似文献
874.
Batch process is a typical multi-phase process. Due to the interaction between the phases of the batch process, high precision control in a single phase cannot guarantee high precision control of the whole batch process. In order to solve this problem, the guaranteed cost iterative learning control (ILC) of multi-phase batch processes is studied in this paper. Firstly, through introducing the output error, the state error and the extended information, the multi-phase batch process is transformed into an equivalent 2D switched system which has different dimensions. In addition, under the measurable condition, the guaranteed cost iterative learning control law with extended information is designed. The proposed control law ensures not only the stability of the system but also the optimal control performance. Next, in order to study the stability of the system and the minimum running time under the condition of stable running, the multi-Lyapunov function method is used. By means of the average dwell time method, the sufficient conditions ensuring system to be exponentially stable are given in the form of linear matrix inequality (LMI). Finally, the injection molding process is taken as an example to make simulation, which shows the feasibility and effectiveness of the proposed method. 相似文献
875.
To reduce network access latency, network traffic volume and server load, caching capacity has been proposed as a component of evolved Node B (eNodeB) in the ratio access network (RAN). These eNodeB caches reduce transport energy consumption but lead to additional energy cost by equipping every eNodeB with caching capacity. Existing researches focus on how to minimize total energy consumption, but often ignore the trade-off between energy efficiency and end user quality of experience, which may lead to undesired network performance degradation. In this paper, for the first time, we build an energy model to formulate the problem of minimizing total energy consumption at eNodeB caches by taking a trade-off between energy efficiency and end user quality of experience. Through coordinating all the eNodeB caches in the same RAN, the proposed model can take a good balance between caching energy and transport energy consumption while also guarantee end user quality of experience. The experimental results demonstrate the effectiveness of the proposed model. Compared with the existing works, our proposal significantly reduces the energy consumption by approximately 17% while keeps superior end user quality of experience performance. 相似文献
876.
Yttria-stabilized zirconia (YSZ) is widely used as thermal barrier coatings (TBCs) to reduce heat transfer between hot gases and metallic components in gas-turbine engines. Porous structure can generally reduce the lattice thermal conductivity of bulk material, so porous YSZ can be potentially used as TBCs with better thermal performance. In this work, we investigate the thermal conductivity of nanoporous YSZ using the nonequilibrium molecular dynamics (NEMD) simulation, and comprehensively discuss the effects of cross-sectional area, pore size, structure length, porosity, Y2O3 concentration and temperature on the thermal conductivity. To compare with the results of the NEMD simulation, we solve the heat diffusion equation and the gray Boltzmann transport equation (BTE) to calculate the thermal conductivity of the same porous structure. From the results, we find that the thermal conductivity of YSZ has a weak dependence on the structure length at the length range from 10 to 26 nm, which indicates that the majority of heat carriers have very short mean free path (MFP) but there exists small percentage (about 3%) of phonons with longer MFP (larger than 10 nm) contributing to the thermal conductivity. The thermal conductivity predicted by NEMD simulation is smaller than that of solving heat diffusion equation (diffusive limit) with the same porous structure. It shows that the presence of pores affects phonon scattering and further affects the thermal conductivity of nanoporous YSZ. The results agree well with the solution of gray BTE with a average MFP of 0.6 nm. The thermal conductivity of nanoporous YSZ weakly depends on the Y2O3 concentration and temperature, which shows the phonons with very short MFP play the major contribution to the thermal conductivity. The results help to better understand the heat transfer in porous YSZ structure and develop better TBCs. 相似文献
877.
Panos G. Michalopoulos Vijaykumar B. Pisharody 《Transportation Research Part B: Methodological》1981,15(5):299-317
Recent improved and rigorous mathematical models describing the formation and dissipation of queues at signalized intersections are employed for deriving delay and effective queue size. Analytical and numerical solutions are presented that are applicable for both isolated and coordinated intersections. Comparisons against results obtained from conventional models reveals significant differences. Further, it is demonstrated that the current practice of calculating delays from input-output analysis results in substantial overestimation of delays. Numerical examples supporting this finding are presented. 相似文献
878.
Manjiang Hu Jian Wu Hongmao Qin Yougang Bian Biao Xu Qing Xu Jugang He Jianqiang Wang 《International Journal of Automotive Technology》2017,18(5):923-932
Vehicular collision often leads to serious casualties and traffic congestion, and the consequences are worse for multiple-vehicle collision. Many previous works on collision avoidance have only focused on the case for two consecutive vehicles using on-board sensors, which ignored the influence on upstream traffic flow. This paper proposes a novel coordinated collision avoidance (CCA) strategy for connected vehicles, which has potential to avoid collision and smooth the braking behaviors of multiple vehicles, leading to an improvement of traffic smoothness. Specifically, model predictive control (MPC) framework is used to formulate the CCA into an optimization problem, where the objective is to minimize the total relative kinetic energy density (RKED) among connected vehicles. Monte Carlo simulations are used to demonstrate the effectiveness of proposed CCA strategy by comparison with other two strategies. Among all the three control strategies, the RKED based control strategy shows the best performance of collision avoidance, including the best crash prevention rates (99.2 % on dry asphalt road and 90.5 % on wet asphalt road) and the best control of distance headways between vehicles. 相似文献
879.
Henk J. Van Zuylen Luis G. Willumsen 《Transportation Research Part B: Methodological》1980,14(3):281-293
For a large number of applications conventional methods for estimating an origin destination matrix become too expensive to use. Two models, based on information minimisation and entropy maximisation principles, have been developed by the authors to estimate an O-D matrix from traffic counts. The models assume knowledge of the paths followed by the vehicles over the network. The models then use the traffic counts to estimate the most likely O-D matrix consistent with the link volumes available and any prior information about the trip matrix. Both models can be used to update and improve a previous O-D matrix. An algorithm to find a solution to the model is then described. The models have been tested with artificial data and performed reasonably well. Further research is being carried out to validate the models with real data. 相似文献
880.
George B. Dantzig Roy P. Harvey Zachary F. Lansdowne David W. Robinson Steven F. Maier 《Transportation Research Part B: Methodological》1979,13(1):5-17
The optimal transportation network design problem is formulated as a convex nonlinear programming problem and a solution method based on standard traffic assignment algorithms is presented. The technique can deal with network improvements which introduce new links, which increase the capacity of existing links, or which decrease the free-flow (uncongested) travel time on existing links (with or without simultaneously increasing link capacity). Preliminary computational experience with the method demonstrates that it is capable of solving very large problems with reasonable amounts of computer time. 相似文献