首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2273篇
  免费   3篇
公路运输   425篇
综合类   667篇
水路运输   747篇
铁路运输   2篇
综合运输   435篇
  2021年   2篇
  2020年   2篇
  2019年   4篇
  2018年   343篇
  2017年   306篇
  2016年   267篇
  2015年   7篇
  2014年   41篇
  2013年   58篇
  2012年   92篇
  2011年   244篇
  2010年   245篇
  2009年   95篇
  2008年   213篇
  2007年   124篇
  2006年   9篇
  2005年   57篇
  2004年   46篇
  2003年   64篇
  2002年   21篇
  2001年   2篇
  2000年   6篇
  1999年   5篇
  1998年   3篇
  1997年   5篇
  1996年   2篇
  1995年   4篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1988年   1篇
  1976年   1篇
  1973年   4篇
排序方式: 共有2276条查询结果,搜索用时 328 毫秒
481.
Hepatic computed tomography(CT) images with Gabor function were analyzed.Then a threshold-based classification scheme was proposed using Gabor features and proceeded with the retrieval of the hepatic CT images.In our experiments, a batch of hepatic CT images containing several types of CT findings was used and compared with the Zhao's image classification scheme, support vector machines(SVM) scheme and threshold-based scheme.  相似文献   
482.
Granular effect of fly ash repairs damage of recycled coarse aggregate   总被引:1,自引:0,他引:1  
Repairing effect of fly ash (FA) on damage of recycled coarse aggregate was evaluated by characteristics of pores and cracks in the vicinity of interracial transition zone (ITZ). The interracial structure between the virgin aggregate and the attached old mortar was investigated and compared with ITZ of recycled aggregate concrete in the presence of FA or ultra-fine FA(UFA) by means of scanning electron microscope (SEM). Diam- eter and plumpness frequency distribution of pores as well as width of the old ITZ, length of contacting points and cracks density were analyzed. The SEM results reveal that the diameter of pores is decreases significantly but pores plumpness increases. A decreased ITZ width and cracks density as well as an increased bonding zone length can also been observed, which indicates that FA or UFA repairs damage of recycled coarse aggregate due to its granular effect.  相似文献   
483.
An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, both of which make an exchange protocol more practical. The scheme is unconditionally secure against the cheating signer, its security against the cheating verifier is reduced to the computational Diffie-Hellman (CDH) problem in the underlying group, it is secure against the cheating trusted third party if the underlying Paterson Schuldt's identity based signature (IBS) scheme is secure, which is proven true based on the CDH assumption in the standard model.  相似文献   
484.
Applications on iterative control and multiple input multiple output (MIMO) system were developed. Two new charts derived from extrinsic information transfer (EXIT) chart were employed as the designing tools, which are called as output mutual information chart with defined iterative degree (DID) chart and near optimum output mutual information (NOMI) chart respectively. Different from the EXIT chart, they can show the iterative performance on the whole signal-to-noise ratio range with one single curve, whereas computation complexity is greatly reduced compared with conventional bit error ratio (BER) performance curve. The iterative control was implemented according to a near-optimum iterative degree vector determined by NOMI chart, the reasonability of uncertain parameters was analyzed in one MIMO system. The concepts were illustrated based on bit-interleaved coded modulation with iterative decoding (BICM-ID).  相似文献   
485.
Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworthiness that is based on the knowledge related to the peer's identity, while identity privacy is usually achieved by hiding such knowledge. A trust model based on trusted computing (TC) technology was proposed to enhance the identity privacy of peers during the trustworthiness evaluation process between peers from different groups. The simulation results show that, the model can be implemented in an efficient way, and when the degree of anonymity within group (DAWG) is up to 0.6 and the percentage of malicious peers is up to 70%7 the service selection failure rate is less than 0.15.  相似文献   
486.
Linux has a special feature of automount in the Linux kernel. Filesystem can be mounted and unmounted automatically. Its performance is similar to MS Windows. It works well under demands of more saving resources and automatization, like memory of system. An approach to install/update software automatically on embedded platform was proposed. This approach derives from above feature based on embedded environment with Linux OS. Configurations of files related to this feature were introduced. An example in practice was given to realize this approach from universal serial bus (USB) memory disk when USB disk is available.  相似文献   
487.
In order to measure the location of medical micro-devices in the gastrointestinal tract, electromagnetic methods were developed considering the magnetic permeability of human bodies. Two varieties of electromagnetic localization methods have been implemented: one uses direct current(DC) to generate the electromagnetic field, and the other uses alternating current (AC). The two varieties of the localization principle were analyzed and relevant experiments were made. The experiments show that the alternating electromagnetic method acquires higher accuracy, higher stability and wider measurement range.  相似文献   
488.
A novel intelligent drug delivery system potential for the more effective therapy of the diabeticswas proposed, and the composition of system was analyzed. Based on the design of micro-electro-mechanicalsystems (MEMS), an iterative modeling process was introduced. Unified modeling language (UML) was em-ployed to describe the function requirement, and different diagrams were built up to explore the static model,the dynamic model and the employment model. The mapping analysis of different diagrams can simply verifythe consistency and completeness of the system model.  相似文献   
489.
A 3D rankine panel method was developed for calculating the linear wave-making resistance of a tri-maran with Wigiey hulls. In order to calculate the normal vector and derivative of the body surface accurately,non-uniform rational B-spline (NURBS) was adopted to represent body surface and rankine source density.The radiation condition is satisfied using the numerical technology of staggered grids. Numerical results showthat the linear wave-making resistance of the trimaran can be calculated effectively using this method.  相似文献   
490.
Numerical analysis of nonlinear rotor-bearing-seal system   总被引:1,自引:0,他引:1  
The system state trajectory, Poincard maps, largest Lyapunov exponents, frequency spectra and bifurcation diagrams were used to investigate the non-linear dynamic behaviors of a rotor-bearing-seal coupled system and to analyze the influence of the seal and bearing on the nonlinear characteristics of the rotor sys- tem. Various nonlinear phenomena in the rotor-bearing-seal system, such as periodic motion, double-periodic motion, multi-periodic motion and quasi-periodic motion were investigated. The results may contribute to a further understanding of the non-linear dynamics of the rotor-bearing-seal coupled system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号