全文获取类型
收费全文 | 1924篇 |
免费 | 0篇 |
专业分类
公路运输 | 201篇 |
综合类 | 672篇 |
水路运输 | 670篇 |
铁路运输 | 13篇 |
综合运输 | 368篇 |
出版年
2023年 | 2篇 |
2022年 | 1篇 |
2018年 | 336篇 |
2017年 | 291篇 |
2016年 | 250篇 |
2015年 | 6篇 |
2014年 | 5篇 |
2013年 | 9篇 |
2012年 | 57篇 |
2011年 | 209篇 |
2010年 | 216篇 |
2009年 | 49篇 |
2008年 | 181篇 |
2007年 | 121篇 |
2005年 | 54篇 |
2004年 | 43篇 |
2003年 | 57篇 |
2002年 | 19篇 |
2000年 | 3篇 |
1999年 | 6篇 |
1998年 | 2篇 |
1997年 | 1篇 |
1994年 | 1篇 |
1990年 | 3篇 |
1989年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有1924条查询结果,搜索用时 0 毫秒
281.
Democratic group signature (DGS) is a group-oriented primitive with great flexibilities, i.e., no group manager, anonymity, and traceability. In a DGS scheme with (t, n)-threshold traceability, any subset of not less than t members can jointly reveal the identity of the signer while preserving security even in the presence of an active adversary can corrupt up to t − 1 group members. This paper proposes an efficient DGS scheme. We use publicly verifiable secret sharing (PVSS) to distribute the trapdoor via which the real signer is revealed. The computation cost and communication overhead of our DGS signatures are greatly reduced, compared with the existing work. For example, the size of the resulting signature contains only 2n + 1 elements of Z q , except the PVSS output. 相似文献
282.
A novel method toward color image segmentation is proposed based on edge linking and region grouping. Firstly, the edges extracted by the Canny detector are linked to form regions. Each of the end points of edges is connected by a direct line to the nearest pixel on another edge segment within a sub-window. A new distance is defined based on the feature that the edge tends to preserve its original direction. By sampling the lines to the image, the image is over-segmented to labeled regions. Secondly, the labeled regions are grouped both locally and globally. A decision tree is constructed to decide the importance of properties that affect the merging procedure. Finally, the result is refined by user’s selection of regions that compose the desired object. Experiments show that the method can effectively segment the object and is much faster than the state-of-the-art color image segmentation methods. 相似文献
283.
To tackle the key-exposure problem in signature settings, this paper introduces a new cryptographic primitive named threshold
key-insulated signature (TKIS) and proposes a concrete TKIS scheme. For a TKIS system, at least k out of n helpers are needed to update a user’s temporary private key. On the one hand, even if up to k−1 helpers are compromised in addition to the exposure of any of temporary private keys, security of the non-exposed periods
is still assured. On the other hand, even if all the n helpers are compromised, we can still ensure the security of all periods as long as none of temporary private keys is exposed.
Compared with traditional key-insulated signature (KIS) schemes, the proposed TKIS scheme not only greatly enhances the security
of the system, but also provides flexibility and efficiency. 相似文献
284.
To explore the possible mechanism of osteogenesis for deciduous teeth stem cells (DTSCs) in vivo/ vitro, stem cells from goat
deciduous teeth (SGDs) were firstly isolated, induced and transplanted into immunocompromised mice. The SGDs’s mineralization
pattern and osteogenesis were compared with bone marrow messenchymal stem cells (BMMSCs) from goats. SGDs have similar osteogenic
differentiation pattern in vitro and bone-like tissue formation mechanism in vivo to BMMSCs; moreover SGDs have stronger alkaline
phosphatase (ALP) gene expression and osteopontin (OPN) gene expression levels than BMMSCs; also SGDs can form more bone-like
tissues than BMMSCs when cell-scaffold compounds are transplanted into immunocompromised mice. This pre-clinical study in
a large-animal model confirms that DTSCs may be an appropriate source of stem cells in repairing bone defects with tissue
engineering. 相似文献
285.
Cluster tools have advantages of shorter cycle times, faster process development, and better yield for less contamination. The sequence of dual-arm cluster tools is a complex logistics process during the semiconductor production. Efficient use of cluster tools is naturally very significant to competitive fab operations. Generating an optimized sequence in a computationally efficient manner and assessing the quality of the requirements to improve the fab production are the key factors for semiconductor manufacturing productivity. The Petri net modeling is introduced to minimize the makespan of the process for the three different logical modes and select a better mode after comparing the makespan among the three logical modes. The tool sequence optimization problem is formulated as optimization firing transition sequences based on the Petri net and then the formulation is converted to be linearly solved by the branch-and-cut method in the standard commercial solver CPLEX. Special methods for the linear conversion are highlighted. Due to the limited calculation time requirement for the real production and the large scale of the problem, special methods for the efficiency tuning are applied according to the characteristics of the problem. Numerical testing is supported by one of the most advanced semiconductor enterprises and the computational results show significant improvement compared with the traditional manual sequence results. 相似文献
286.
Plasma sprayed coatings are built up by the accumulation of splats formed by the impacting, spreading and solidifying of molten
droplets on the substrate. A three-dimensional computational model including heat transfer and solidification is established
to simulate the formation process of a single splat using the computational fluid dynamics (CFD) software, FLUENT. The fluid
flow and energy equations are discretized and solved according to typical finite volume method on an unstructured grid. A
volume of fluid (VOF) tracking algorithm is used to track the droplet flow with free surface. In order to understand the splat
formation mechanism, the process of splat formation caused by impacting and spreading of a molten nickel droplet on a polished
mild steel surface is simulated. On this basis, the simulations of impact of a molten droplet on substrate with different
conditions including the surface morphology, thermal conductivity, initial temperature of the substrate and the thermal contact
resistance are presented. The results clearly show the effect of those parameters on the shape of the final splat and splash
behaviors. 相似文献
287.
High performance computer is often required by model predictive control (MPC) systems due to the heavy online computation
burden. To extend MPC to more application cases with low-cost computation facilities, the implementation of MPC controller
on field programmable gate array (FPGA) system is studied. For the dynamic matrix control (DMC) algorithm, the main design
idea and the implemental strategy of DMC controller are introduced based on a FPGA’s embedded system. The performance tests
show that both the computation efficiency and the accuracy of the proposed controller can be satisfied due to the parallel
computing capability of FPGA. 相似文献
288.
In a coil box between the roughing and finishing stands on a hot strip mill, a problem has been encountered that the entry region of the plate touches the bending rolls and deforms. As a result, the defective coil occurs. The condition of plate bending, which forms a new deformation feature in coiling, is analyzed. In this paper, the authors focus on the research of the effects of coiling parameters, such as the thickness of plate, roll speed and feeding speed of plate in coil box, and on specific plate bending. A finite element method is developed to simulate this coiling process. Based on numerical simulation, the effects of the coiling parameters on the mechanics and deformation of the bending plate are obtained. Numerical simulation tests have verified the validity of the developed model. 相似文献
289.
Radar target signals and chaff cloud jamming signals have different characters by the wavelet transform. The wavelet coefficients of radar target signals are highly correlated with its near-and-near-scale wavelet coefficients, however the correlativity between the wavelet coefficients of chaff cloud jamming signals and its near-and-near scale wavelet coefficients is less significant. Based on the binary-base discrete wavelet transform and the correlation algorithm, the method of target entropy to estimate standard variance of the jamming signals and each scale is proposed to ensure reasonable threshold, to suppress chaff cloud signals and finally to reconstruct mixed signals by the improved spatially selective noise filtration (ISSNF) method. The extensive simulation results show that the proposed method can availably suppress chaff cloud jamming and decontaminate target echo. 相似文献
290.
Packet analysis is very important in our digital life. But what protocol analyzers can do is limited because they can only
process data in determined format. This paper puts forward a solution to decode raw data in an unknown format. It is certain
that data can be cut into packets because there are usually characteristic bit sequences in packet headers. The key to solve
the problem is how to find out those characteristic sequences. We present an efficient way of bit sequence enumeration. Both
Aho-Corasick (AC) algorithm and data mining method are used to reduce the cost of the process. 相似文献