全文获取类型
收费全文 | 2275篇 |
免费 | 1篇 |
专业分类
公路运输 | 425篇 |
综合类 | 667篇 |
水路运输 | 747篇 |
铁路运输 | 2篇 |
综合运输 | 435篇 |
出版年
2021年 | 2篇 |
2020年 | 2篇 |
2019年 | 4篇 |
2018年 | 343篇 |
2017年 | 306篇 |
2016年 | 267篇 |
2015年 | 7篇 |
2014年 | 41篇 |
2013年 | 58篇 |
2012年 | 92篇 |
2011年 | 244篇 |
2010年 | 245篇 |
2009年 | 95篇 |
2008年 | 213篇 |
2007年 | 124篇 |
2006年 | 9篇 |
2005年 | 57篇 |
2004年 | 46篇 |
2003年 | 64篇 |
2002年 | 21篇 |
2001年 | 2篇 |
2000年 | 6篇 |
1999年 | 5篇 |
1998年 | 3篇 |
1997年 | 5篇 |
1996年 | 2篇 |
1995年 | 4篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1988年 | 1篇 |
1976年 | 1篇 |
1973年 | 4篇 |
排序方式: 共有2276条查询结果,搜索用时 0 毫秒
341.
Democratic group signature (DGS) is a group-oriented primitive with great flexibilities, i.e., no group manager, anonymity, and traceability. In a DGS scheme with (t, n)-threshold traceability, any subset of not less than t members can jointly reveal the identity of the signer while preserving security even in the presence of an active adversary can corrupt up to t − 1 group members. This paper proposes an efficient DGS scheme. We use publicly verifiable secret sharing (PVSS) to distribute the trapdoor via which the real signer is revealed. The computation cost and communication overhead of our DGS signatures are greatly reduced, compared with the existing work. For example, the size of the resulting signature contains only 2n + 1 elements of Z q , except the PVSS output. 相似文献
342.
A novel method toward color image segmentation is proposed based on edge linking and region grouping. Firstly, the edges extracted by the Canny detector are linked to form regions. Each of the end points of edges is connected by a direct line to the nearest pixel on another edge segment within a sub-window. A new distance is defined based on the feature that the edge tends to preserve its original direction. By sampling the lines to the image, the image is over-segmented to labeled regions. Secondly, the labeled regions are grouped both locally and globally. A decision tree is constructed to decide the importance of properties that affect the merging procedure. Finally, the result is refined by user’s selection of regions that compose the desired object. Experiments show that the method can effectively segment the object and is much faster than the state-of-the-art color image segmentation methods. 相似文献
343.
To tackle the key-exposure problem in signature settings, this paper introduces a new cryptographic primitive named threshold
key-insulated signature (TKIS) and proposes a concrete TKIS scheme. For a TKIS system, at least k out of n helpers are needed to update a user’s temporary private key. On the one hand, even if up to k−1 helpers are compromised in addition to the exposure of any of temporary private keys, security of the non-exposed periods
is still assured. On the other hand, even if all the n helpers are compromised, we can still ensure the security of all periods as long as none of temporary private keys is exposed.
Compared with traditional key-insulated signature (KIS) schemes, the proposed TKIS scheme not only greatly enhances the security
of the system, but also provides flexibility and efficiency. 相似文献
344.
To explore the possible mechanism of osteogenesis for deciduous teeth stem cells (DTSCs) in vivo/ vitro, stem cells from goat
deciduous teeth (SGDs) were firstly isolated, induced and transplanted into immunocompromised mice. The SGDs’s mineralization
pattern and osteogenesis were compared with bone marrow messenchymal stem cells (BMMSCs) from goats. SGDs have similar osteogenic
differentiation pattern in vitro and bone-like tissue formation mechanism in vivo to BMMSCs; moreover SGDs have stronger alkaline
phosphatase (ALP) gene expression and osteopontin (OPN) gene expression levels than BMMSCs; also SGDs can form more bone-like
tissues than BMMSCs when cell-scaffold compounds are transplanted into immunocompromised mice. This pre-clinical study in
a large-animal model confirms that DTSCs may be an appropriate source of stem cells in repairing bone defects with tissue
engineering. 相似文献
345.
For the applied limitation of the existing threshold decryption schemes based on the (t, n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares. The generation and distribution of private key shares, the encryption, the decryption and the combination are introduced in detail. The validity and security of the scheme are proved and analyzed. Comparisons with the existing schemes show that the proposed scheme is more flexible. 相似文献
346.
Plasma sprayed coatings are built up by the accumulation of splats formed by the impacting, spreading and solidifying of molten
droplets on the substrate. A three-dimensional computational model including heat transfer and solidification is established
to simulate the formation process of a single splat using the computational fluid dynamics (CFD) software, FLUENT. The fluid
flow and energy equations are discretized and solved according to typical finite volume method on an unstructured grid. A
volume of fluid (VOF) tracking algorithm is used to track the droplet flow with free surface. In order to understand the splat
formation mechanism, the process of splat formation caused by impacting and spreading of a molten nickel droplet on a polished
mild steel surface is simulated. On this basis, the simulations of impact of a molten droplet on substrate with different
conditions including the surface morphology, thermal conductivity, initial temperature of the substrate and the thermal contact
resistance are presented. The results clearly show the effect of those parameters on the shape of the final splat and splash
behaviors. 相似文献
347.
High performance computer is often required by model predictive control (MPC) systems due to the heavy online computation
burden. To extend MPC to more application cases with low-cost computation facilities, the implementation of MPC controller
on field programmable gate array (FPGA) system is studied. For the dynamic matrix control (DMC) algorithm, the main design
idea and the implemental strategy of DMC controller are introduced based on a FPGA’s embedded system. The performance tests
show that both the computation efficiency and the accuracy of the proposed controller can be satisfied due to the parallel
computing capability of FPGA. 相似文献
348.
In a coil box between the roughing and finishing stands on a hot strip mill, a problem has been encountered that the entry region of the plate touches the bending rolls and deforms. As a result, the defective coil occurs. The condition of plate bending, which forms a new deformation feature in coiling, is analyzed. In this paper, the authors focus on the research of the effects of coiling parameters, such as the thickness of plate, roll speed and feeding speed of plate in coil box, and on specific plate bending. A finite element method is developed to simulate this coiling process. Based on numerical simulation, the effects of the coiling parameters on the mechanics and deformation of the bending plate are obtained. Numerical simulation tests have verified the validity of the developed model. 相似文献
349.
Radar target signals and chaff cloud jamming signals have different characters by the wavelet transform. The wavelet coefficients of radar target signals are highly correlated with its near-and-near-scale wavelet coefficients, however the correlativity between the wavelet coefficients of chaff cloud jamming signals and its near-and-near scale wavelet coefficients is less significant. Based on the binary-base discrete wavelet transform and the correlation algorithm, the method of target entropy to estimate standard variance of the jamming signals and each scale is proposed to ensure reasonable threshold, to suppress chaff cloud signals and finally to reconstruct mixed signals by the improved spatially selective noise filtration (ISSNF) method. The extensive simulation results show that the proposed method can availably suppress chaff cloud jamming and decontaminate target echo. 相似文献
350.
Collaborative spectrum sensing is proposed to improve the detection performance in cognitive radio (CR) networks. However,
most of the current collaborative sensing schemes are vulnerable to the interference of the malicious secondary users (SUs).
In this paper we propose a reputation-based collaborative spectrum sensing scheme to improve the security of cooperative sensing
by mitigating the impacts of misbehaviors. The fusion center calculates the reputation rating of each SU according to their
history reports to weight their sensing results in the proposed scheme. We analyze and evaluate the performance of the proposed
scheme and its advantages over previous schemes in expansibility and integrity. Simulation results show that the proposed
scheme can minimize the harmful influence from malicious SUs. 相似文献