首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1886篇
  免费   5篇
公路运输   190篇
综合类   657篇
水路运输   662篇
铁路运输   1篇
综合运输   381篇
  2022年   1篇
  2021年   2篇
  2020年   2篇
  2019年   1篇
  2018年   334篇
  2017年   290篇
  2016年   250篇
  2015年   2篇
  2014年   5篇
  2013年   7篇
  2012年   56篇
  2011年   205篇
  2010年   214篇
  2009年   45篇
  2008年   177篇
  2007年   121篇
  2006年   2篇
  2005年   50篇
  2004年   45篇
  2003年   55篇
  2002年   16篇
  2001年   1篇
  2000年   1篇
  1999年   2篇
  1996年   1篇
  1995年   1篇
  1993年   1篇
  1990年   2篇
  1988年   1篇
  1985年   1篇
排序方式: 共有1891条查询结果,搜索用时 15 毫秒
251.
In the light of the newly developed harmonised probabilistic damage stability regulations, set to come into force in 2009, this article presents a systematic and thorough analysis of the sensitivity of the Attained Subdivision Index with reference to a wide range of related design parameters. The sensitivity of the probabilistic regulations was investigated for a typical large RoPax vessel, with variation of parameters, such as the number, positioning and local optimisation of transverse bulkheads; the presence and position of longitudinal bulkheads below the main vehicle deck; the presence of side casings; and the height of the main deck and double bottom. The effects of water on deck and of operational parameters (draught, centre of gravity and trim) were also investigated. The results of the study, presented in graphical form, can provide valuable assistance to the designer when determining subdivision characteristics at the very early stage of the design process, resulting in optimal, efficient and safe ships.  相似文献   
252.
The present paper presents a historical review associated with the research works on hull girder strength of ship and ship-shaped structures. Then, a new program is developed to determine the ultimate vertical bending moment of hull girder by applying direct method, stress distribution method, and progressive collapse analysis method. Six ships and ship-shaped structures used in the benchmark study of International Ship and Offshore Structures Congress (ISSC) in 2012 are adopted as examples. The calculation results by applying the developed program are analyzed and compared with the existing results. Finally, the roles of the developed program and its further development are discussed.  相似文献   
253.
In order to remotely monitor and maintain large-scale complex equipment in real time, China Telecom plans to create a total solution that integrates remote data collection, transmission, storage, analysis and prediction. This solution can provide manufacturers with proactive, systematic, integrated operation and maintenance service, and the data analysis and health forecasting are the most important part. This paper conducts health management for the turbine blades. Elman neural network, and improved Elman neural network, i.e., outputhidden feedback (OHF) Elman neural network are studied as the main research methods. The results verify the applicability of OHF Elman neural network.  相似文献   
254.
This study was carried out to investigate the creep life at the high temperature of the Alloy 718 for automotive engine components using the initial strain parameter method (ISPM). Creep tests have performed at elevated temperatures in the range of 550 oC to 700 oC in this work. We also carried out constant stress creep tests. The initial strains were measured during 1 minute after loading. Both the creep stress and rupture time depend on the initial strain. We calculated the creep life of Alloy 718 by using the creep life prediction equations obtained from the ISPM. Then, we compared the creep life predicted by the ISPM to the Larson-Miller parameter (LMP). The experimental rupture time and the calculated rupture time by using the ISPM agreed with a confidence level of 95 %. The creep life predicted by using the ISPM was in very good agreement with the creep life predicted using the LMP method.  相似文献   
255.
In the connected vehicles, connecting interfaces bring threats to the vehicles and they can be hacked to impact the vehicles and drivers. Compared with traditional vehicles, connected vehicles require more information transfer. Sensor signals and critical data must be protected to ensure the cyber security of connected vehicles. The communications among ECUs, sensors, and gateways are connected by in-vehicle networks. This paper discussed the state-of-art techniques about secure communication for in-vehicle networks. First, the related concepts in automotive secure communication have been provided. Then we have compared and contrasted existing approaches for secure communication. We have analyzed the advantages/disadvantages of MAC and digital signatures for message authentication and compared the performance and limitations of different cryptographic algorithms. Firewall and intrusion detection system are introduced to protect the networks. The constraints and features of different intrusion detection approaches are presented. After that, the technical requirements for cryptographic mechanism and intrusion detection policy are concluded. Based on the review of current researches, the future development directions of the automotive network security have been discussed. The purpose of this paper is to review current techniques on automotive secure communication and suggest suitable secure approaches to implement on the in-vehicle networks.  相似文献   
256.
The smoothed particle hydrodynamics (SPH), as a fully Lagrangian particle method, has been successfully applied to astrophysical problems and extended to elastic dynamics and computational fluid dynamics.High order derivatives have to be approximated when elastic dynamics problems are modeled. However, the approximation errors in SPH could lead to computational failure in the case that the order of derivative is high.A novel method was proposed in order to improve the accuracy of SPH method, which shows the relationship between the selected functions and their SPH approximations. The entire involved system was represented by a finite number of particles that carry individual mass and occupy individual space, and the integral interpolation was approximated by a summation interpolation. In addition, error comparison was made between SPH method with and without the present improvement.  相似文献   
257.
Numerical modeling of ground response during diaphragm wall construction   总被引:2,自引:0,他引:2  
Construction of diaphragm wall panels may cause considerable stress changes in heavily overconsolidated soil deposits and can induce substantial ground movement. The 3D Lagrangian method was adopted to model the mechanical response of ground, including horizontal normal stress and shear stress, lateral ground displacement and vertical ground surface settlement, during the slurry trenching and concreting of diaphragm wall panels. Numerical results show that slurry trenching leads to horizontal stress relief of ground, reducing the horizontal stress of the ground from initial K0 pressure to hydrostatic betonite pressure. Wet concrete pressure lies between the hydrostatic bentonite pressure and the initial K0 pressure, so it can compensate partially the horizontal stress loss of the ground adjacent to the trench and thus reduce the lateral movement of the trench face as well as the vertical settlement of the ground surface.  相似文献   
258.
The parameter values which actually change with the circumstances, weather and load level etc.produce great effect to the result of state estimation. A new parameter estimation method based on data mining technology was proposed. The clustering method was used to classify the historical data in supervisory control and data acquisition (SCADA) database as several types. The data processing technology was impliedto treat the isolated point, missing data and yawp data in samples for classified groups. The measurement data which belong to each classification were introduced to the linear regression equation in order to gain the regression coefficient and actual parameters by the least square method. A practical system demonstrates the high correctness, reliability and strong practicability of the proposed method.  相似文献   
259.
Analysis and improvement of authenticatable ring signcryption scheme   总被引:1,自引:0,他引:1  
We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks.Furthermore, we propose an improved scheme that remedies the weakness of the Zhang-Yang-Zhu-Zhang scheme.The improved scheme has shorter ciphertext size than the Zhang-Yang-Zhu-Zhang scheme.We then prove that the improved scheme satisfies confidentiality, unforgeability, anonymity and authenticatability.  相似文献   
260.
In this study, the influence on fuel economy testing of gasoline-powered vehicles is evaluated for various test conditions (e.g., laboratory temperature, soaking time, cooling fan, battery charge state, and driving mode tracking). It showed a difference in fuel economy results of approximately 3 % between low (88 %) and high (99 %) battery state of charge conditions because the alternator saving function has a positive effect on fuel economy. Fuel economy testing with laboratory temperature changes gave a slight reduction at 21 °C and slight increase at 29 °C. The cooling fan changes had an almost negligible effect on fuel consumption. The largest fuel economy result varied by 5.2 % in the soft, standard, and rough driving conditions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号