首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2275篇
  免费   1篇
公路运输   425篇
综合类   667篇
水路运输   747篇
铁路运输   2篇
综合运输   435篇
  2021年   2篇
  2020年   2篇
  2019年   4篇
  2018年   343篇
  2017年   306篇
  2016年   267篇
  2015年   7篇
  2014年   41篇
  2013年   58篇
  2012年   92篇
  2011年   244篇
  2010年   245篇
  2009年   95篇
  2008年   213篇
  2007年   124篇
  2006年   9篇
  2005年   57篇
  2004年   46篇
  2003年   64篇
  2002年   21篇
  2001年   2篇
  2000年   6篇
  1999年   5篇
  1998年   3篇
  1997年   5篇
  1996年   2篇
  1995年   4篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1988年   1篇
  1976年   1篇
  1973年   4篇
排序方式: 共有2276条查询结果,搜索用时 0 毫秒
341.
Democratic group signature (DGS) is a group-oriented primitive with great flexibilities, i.e., no group manager, anonymity, and traceability. In a DGS scheme with (t, n)-threshold traceability, any subset of not less than t members can jointly reveal the identity of the signer while preserving security even in the presence of an active adversary can corrupt up to t − 1 group members. This paper proposes an efficient DGS scheme. We use publicly verifiable secret sharing (PVSS) to distribute the trapdoor via which the real signer is revealed. The computation cost and communication overhead of our DGS signatures are greatly reduced, compared with the existing work. For example, the size of the resulting signature contains only 2n + 1 elements of Z q , except the PVSS output.  相似文献   
342.
A novel method toward color image segmentation is proposed based on edge linking and region grouping. Firstly, the edges extracted by the Canny detector are linked to form regions. Each of the end points of edges is connected by a direct line to the nearest pixel on another edge segment within a sub-window. A new distance is defined based on the feature that the edge tends to preserve its original direction. By sampling the lines to the image, the image is over-segmented to labeled regions. Secondly, the labeled regions are grouped both locally and globally. A decision tree is constructed to decide the importance of properties that affect the merging procedure. Finally, the result is refined by user’s selection of regions that compose the desired object. Experiments show that the method can effectively segment the object and is much faster than the state-of-the-art color image segmentation methods.  相似文献   
343.
To tackle the key-exposure problem in signature settings, this paper introduces a new cryptographic primitive named threshold key-insulated signature (TKIS) and proposes a concrete TKIS scheme. For a TKIS system, at least k out of n helpers are needed to update a user’s temporary private key. On the one hand, even if up to k−1 helpers are compromised in addition to the exposure of any of temporary private keys, security of the non-exposed periods is still assured. On the other hand, even if all the n helpers are compromised, we can still ensure the security of all periods as long as none of temporary private keys is exposed. Compared with traditional key-insulated signature (KIS) schemes, the proposed TKIS scheme not only greatly enhances the security of the system, but also provides flexibility and efficiency.  相似文献   
344.
To explore the possible mechanism of osteogenesis for deciduous teeth stem cells (DTSCs) in vivo/ vitro, stem cells from goat deciduous teeth (SGDs) were firstly isolated, induced and transplanted into immunocompromised mice. The SGDs’s mineralization pattern and osteogenesis were compared with bone marrow messenchymal stem cells (BMMSCs) from goats. SGDs have similar osteogenic differentiation pattern in vitro and bone-like tissue formation mechanism in vivo to BMMSCs; moreover SGDs have stronger alkaline phosphatase (ALP) gene expression and osteopontin (OPN) gene expression levels than BMMSCs; also SGDs can form more bone-like tissues than BMMSCs when cell-scaffold compounds are transplanted into immunocompromised mice. This pre-clinical study in a large-animal model confirms that DTSCs may be an appropriate source of stem cells in repairing bone defects with tissue engineering.  相似文献   
345.
For the applied limitation of the existing threshold decryption schemes based on the (t, n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares. The generation and distribution of private key shares, the encryption, the decryption and the combination are introduced in detail. The validity and security of the scheme are proved and analyzed. Comparisons with the existing schemes show that the proposed scheme is more flexible.  相似文献   
346.
Plasma sprayed coatings are built up by the accumulation of splats formed by the impacting, spreading and solidifying of molten droplets on the substrate. A three-dimensional computational model including heat transfer and solidification is established to simulate the formation process of a single splat using the computational fluid dynamics (CFD) software, FLUENT. The fluid flow and energy equations are discretized and solved according to typical finite volume method on an unstructured grid. A volume of fluid (VOF) tracking algorithm is used to track the droplet flow with free surface. In order to understand the splat formation mechanism, the process of splat formation caused by impacting and spreading of a molten nickel droplet on a polished mild steel surface is simulated. On this basis, the simulations of impact of a molten droplet on substrate with different conditions including the surface morphology, thermal conductivity, initial temperature of the substrate and the thermal contact resistance are presented. The results clearly show the effect of those parameters on the shape of the final splat and splash behaviors.  相似文献   
347.
High performance computer is often required by model predictive control (MPC) systems due to the heavy online computation burden. To extend MPC to more application cases with low-cost computation facilities, the implementation of MPC controller on field programmable gate array (FPGA) system is studied. For the dynamic matrix control (DMC) algorithm, the main design idea and the implemental strategy of DMC controller are introduced based on a FPGA’s embedded system. The performance tests show that both the computation efficiency and the accuracy of the proposed controller can be satisfied due to the parallel computing capability of FPGA.  相似文献   
348.
In a coil box between the roughing and finishing stands on a hot strip mill, a problem has been encountered that the entry region of the plate touches the bending rolls and deforms. As a result, the defective coil occurs. The condition of plate bending, which forms a new deformation feature in coiling, is analyzed. In this paper, the authors focus on the research of the effects of coiling parameters, such as the thickness of plate, roll speed and feeding speed of plate in coil box, and on specific plate bending. A finite element method is developed to simulate this coiling process. Based on numerical simulation, the effects of the coiling parameters on the mechanics and deformation of the bending plate are obtained. Numerical simulation tests have verified the validity of the developed model.  相似文献   
349.
Radar target signals and chaff cloud jamming signals have different characters by the wavelet transform. The wavelet coefficients of radar target signals are highly correlated with its near-and-near-scale wavelet coefficients, however the correlativity between the wavelet coefficients of chaff cloud jamming signals and its near-and-near scale wavelet coefficients is less significant. Based on the binary-base discrete wavelet transform and the correlation algorithm, the method of target entropy to estimate standard variance of the jamming signals and each scale is proposed to ensure reasonable threshold, to suppress chaff cloud signals and finally to reconstruct mixed signals by the improved spatially selective noise filtration (ISSNF) method. The extensive simulation results show that the proposed method can availably suppress chaff cloud jamming and decontaminate target echo.  相似文献   
350.
Collaborative spectrum sensing is proposed to improve the detection performance in cognitive radio (CR) networks. However, most of the current collaborative sensing schemes are vulnerable to the interference of the malicious secondary users (SUs). In this paper we propose a reputation-based collaborative spectrum sensing scheme to improve the security of cooperative sensing by mitigating the impacts of misbehaviors. The fusion center calculates the reputation rating of each SU according to their history reports to weight their sensing results in the proposed scheme. We analyze and evaluate the performance of the proposed scheme and its advantages over previous schemes in expansibility and integrity. Simulation results show that the proposed scheme can minimize the harmful influence from malicious SUs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号