首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1924篇
  免费   0篇
公路运输   201篇
综合类   672篇
水路运输   670篇
铁路运输   13篇
综合运输   368篇
  2023年   2篇
  2022年   1篇
  2018年   336篇
  2017年   291篇
  2016年   250篇
  2015年   6篇
  2014年   5篇
  2013年   9篇
  2012年   57篇
  2011年   209篇
  2010年   216篇
  2009年   49篇
  2008年   181篇
  2007年   121篇
  2005年   54篇
  2004年   43篇
  2003年   57篇
  2002年   19篇
  2000年   3篇
  1999年   6篇
  1998年   2篇
  1997年   1篇
  1994年   1篇
  1990年   3篇
  1989年   1篇
  1973年   1篇
排序方式: 共有1924条查询结果,搜索用时 0 毫秒
281.
Democratic group signature (DGS) is a group-oriented primitive with great flexibilities, i.e., no group manager, anonymity, and traceability. In a DGS scheme with (t, n)-threshold traceability, any subset of not less than t members can jointly reveal the identity of the signer while preserving security even in the presence of an active adversary can corrupt up to t − 1 group members. This paper proposes an efficient DGS scheme. We use publicly verifiable secret sharing (PVSS) to distribute the trapdoor via which the real signer is revealed. The computation cost and communication overhead of our DGS signatures are greatly reduced, compared with the existing work. For example, the size of the resulting signature contains only 2n + 1 elements of Z q , except the PVSS output.  相似文献   
282.
A novel method toward color image segmentation is proposed based on edge linking and region grouping. Firstly, the edges extracted by the Canny detector are linked to form regions. Each of the end points of edges is connected by a direct line to the nearest pixel on another edge segment within a sub-window. A new distance is defined based on the feature that the edge tends to preserve its original direction. By sampling the lines to the image, the image is over-segmented to labeled regions. Secondly, the labeled regions are grouped both locally and globally. A decision tree is constructed to decide the importance of properties that affect the merging procedure. Finally, the result is refined by user’s selection of regions that compose the desired object. Experiments show that the method can effectively segment the object and is much faster than the state-of-the-art color image segmentation methods.  相似文献   
283.
To tackle the key-exposure problem in signature settings, this paper introduces a new cryptographic primitive named threshold key-insulated signature (TKIS) and proposes a concrete TKIS scheme. For a TKIS system, at least k out of n helpers are needed to update a user’s temporary private key. On the one hand, even if up to k−1 helpers are compromised in addition to the exposure of any of temporary private keys, security of the non-exposed periods is still assured. On the other hand, even if all the n helpers are compromised, we can still ensure the security of all periods as long as none of temporary private keys is exposed. Compared with traditional key-insulated signature (KIS) schemes, the proposed TKIS scheme not only greatly enhances the security of the system, but also provides flexibility and efficiency.  相似文献   
284.
To explore the possible mechanism of osteogenesis for deciduous teeth stem cells (DTSCs) in vivo/ vitro, stem cells from goat deciduous teeth (SGDs) were firstly isolated, induced and transplanted into immunocompromised mice. The SGDs’s mineralization pattern and osteogenesis were compared with bone marrow messenchymal stem cells (BMMSCs) from goats. SGDs have similar osteogenic differentiation pattern in vitro and bone-like tissue formation mechanism in vivo to BMMSCs; moreover SGDs have stronger alkaline phosphatase (ALP) gene expression and osteopontin (OPN) gene expression levels than BMMSCs; also SGDs can form more bone-like tissues than BMMSCs when cell-scaffold compounds are transplanted into immunocompromised mice. This pre-clinical study in a large-animal model confirms that DTSCs may be an appropriate source of stem cells in repairing bone defects with tissue engineering.  相似文献   
285.
Cluster tools have advantages of shorter cycle times, faster process development, and better yield for less contamination. The sequence of dual-arm cluster tools is a complex logistics process during the semiconductor production. Efficient use of cluster tools is naturally very significant to competitive fab operations. Generating an optimized sequence in a computationally efficient manner and assessing the quality of the requirements to improve the fab production are the key factors for semiconductor manufacturing productivity. The Petri net modeling is introduced to minimize the makespan of the process for the three different logical modes and select a better mode after comparing the makespan among the three logical modes. The tool sequence optimization problem is formulated as optimization firing transition sequences based on the Petri net and then the formulation is converted to be linearly solved by the branch-and-cut method in the standard commercial solver CPLEX. Special methods for the linear conversion are highlighted. Due to the limited calculation time requirement for the real production and the large scale of the problem, special methods for the efficiency tuning are applied according to the characteristics of the problem. Numerical testing is supported by one of the most advanced semiconductor enterprises and the computational results show significant improvement compared with the traditional manual sequence results.  相似文献   
286.
Plasma sprayed coatings are built up by the accumulation of splats formed by the impacting, spreading and solidifying of molten droplets on the substrate. A three-dimensional computational model including heat transfer and solidification is established to simulate the formation process of a single splat using the computational fluid dynamics (CFD) software, FLUENT. The fluid flow and energy equations are discretized and solved according to typical finite volume method on an unstructured grid. A volume of fluid (VOF) tracking algorithm is used to track the droplet flow with free surface. In order to understand the splat formation mechanism, the process of splat formation caused by impacting and spreading of a molten nickel droplet on a polished mild steel surface is simulated. On this basis, the simulations of impact of a molten droplet on substrate with different conditions including the surface morphology, thermal conductivity, initial temperature of the substrate and the thermal contact resistance are presented. The results clearly show the effect of those parameters on the shape of the final splat and splash behaviors.  相似文献   
287.
High performance computer is often required by model predictive control (MPC) systems due to the heavy online computation burden. To extend MPC to more application cases with low-cost computation facilities, the implementation of MPC controller on field programmable gate array (FPGA) system is studied. For the dynamic matrix control (DMC) algorithm, the main design idea and the implemental strategy of DMC controller are introduced based on a FPGA’s embedded system. The performance tests show that both the computation efficiency and the accuracy of the proposed controller can be satisfied due to the parallel computing capability of FPGA.  相似文献   
288.
In a coil box between the roughing and finishing stands on a hot strip mill, a problem has been encountered that the entry region of the plate touches the bending rolls and deforms. As a result, the defective coil occurs. The condition of plate bending, which forms a new deformation feature in coiling, is analyzed. In this paper, the authors focus on the research of the effects of coiling parameters, such as the thickness of plate, roll speed and feeding speed of plate in coil box, and on specific plate bending. A finite element method is developed to simulate this coiling process. Based on numerical simulation, the effects of the coiling parameters on the mechanics and deformation of the bending plate are obtained. Numerical simulation tests have verified the validity of the developed model.  相似文献   
289.
Radar target signals and chaff cloud jamming signals have different characters by the wavelet transform. The wavelet coefficients of radar target signals are highly correlated with its near-and-near-scale wavelet coefficients, however the correlativity between the wavelet coefficients of chaff cloud jamming signals and its near-and-near scale wavelet coefficients is less significant. Based on the binary-base discrete wavelet transform and the correlation algorithm, the method of target entropy to estimate standard variance of the jamming signals and each scale is proposed to ensure reasonable threshold, to suppress chaff cloud signals and finally to reconstruct mixed signals by the improved spatially selective noise filtration (ISSNF) method. The extensive simulation results show that the proposed method can availably suppress chaff cloud jamming and decontaminate target echo.  相似文献   
290.
Packet analysis is very important in our digital life. But what protocol analyzers can do is limited because they can only process data in determined format. This paper puts forward a solution to decode raw data in an unknown format. It is certain that data can be cut into packets because there are usually characteristic bit sequences in packet headers. The key to solve the problem is how to find out those characteristic sequences. We present an efficient way of bit sequence enumeration. Both Aho-Corasick (AC) algorithm and data mining method are used to reduce the cost of the process.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号