全文获取类型
收费全文 | 5807篇 |
免费 | 70篇 |
专业分类
公路运输 | 1319篇 |
综合类 | 1556篇 |
水路运输 | 1718篇 |
铁路运输 | 727篇 |
综合运输 | 557篇 |
出版年
2024年 | 2篇 |
2023年 | 23篇 |
2022年 | 90篇 |
2021年 | 125篇 |
2020年 | 83篇 |
2019年 | 28篇 |
2018年 | 377篇 |
2017年 | 317篇 |
2016年 | 303篇 |
2015年 | 69篇 |
2014年 | 121篇 |
2013年 | 216篇 |
2012年 | 317篇 |
2011年 | 480篇 |
2010年 | 508篇 |
2009年 | 366篇 |
2008年 | 464篇 |
2007年 | 527篇 |
2006年 | 386篇 |
2005年 | 301篇 |
2004年 | 121篇 |
2003年 | 128篇 |
2002年 | 85篇 |
2001年 | 93篇 |
2000年 | 75篇 |
1999年 | 52篇 |
1998年 | 39篇 |
1997年 | 34篇 |
1996年 | 37篇 |
1995年 | 21篇 |
1994年 | 13篇 |
1993年 | 17篇 |
1992年 | 17篇 |
1991年 | 14篇 |
1990年 | 7篇 |
1989年 | 10篇 |
1988年 | 2篇 |
1987年 | 2篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1983年 | 2篇 |
排序方式: 共有5877条查询结果,搜索用时 296 毫秒
301.
302.
Michael Ekow Manuel 《WMU Journal of Maritime Affairs》2017,16(3):473-483
Traditional seafarer training has always focused on the acquisition and use of practical skills. The prevailing view is that, while this approach addresses a degree of cognitive skills, it focuses on and gives much more emphasis to the acquisition of hands-on practical skills for the performance of specific tasks. On the other hand, academic education has been seen to be much more focused on the development of in-depth analytical and critical thinking skills; cognitive skills that are less reliant on hands-on task-oriented training, but stress critical reading and discussion. The global trend in maritime education and training is increasingly to link an essentially vocational education that provides specific and restricted competence outcomes with more general or deeper academic components leading to an academic qualification. This trend has led to some dilemmas for curriculum development, for training legislation in a global industry, and for achieving desired learning outcomes in a professional setting (in the shipping industry). This paper discusses some of the challenges arising from this trend and the opportunities the trend offers. 相似文献
303.
Ren-Yong GuoHai-Jun Huang S.C. Wong 《Transportation Research Part B: Methodological》2011,45(3):490-506
We present a method of predicting pedestrian route choice behavior and physical congestion during the evacuation of indoor areas with internal obstacles. Under the proposed method, a network is first constructed by discretizing the space into regular hexagonal cells and giving these cells potentials before a modified cell transmission model is employed to predict the evolution of pedestrian flow in the network over time and space. Several properties of this cell transmission model are explored. The method can be used to predict the evolution of pedestrian flow over time and space in indoor areas with internal obstacles and to investigate the collection, spillback, and dissipation behavior of pedestrians passing through a bottleneck. The cell transmission model is further extended to imitate the movements of multiple flows of pedestrians with different destinations. An algorithm based on generalized cell potential is also developed to assign the pedestrian flow. 相似文献
304.
Carlos Jerome Lawrence A. Howard Ezgi Uzel Jameela R. Androulidakis 《WMU Journal of Maritime Affairs》2017,16(1):89-98
Protection against on-ship infectious disease—whether due to mishap or to harmful purpose—faces special situational problems. Sometimes, when infection levels on board have reached threshold levels, emergency actions are required. Often, the most thorough strategies for responding to threat are not feasible. A rapid first-stage test (RFT) is a fast, minimally invasive procedure used to rule out from possible infection a large percentage of an infection-threatened group. Prevention and control of on-ship infection need to combine various interconnected tactics. When timely criterion tests are not possible, the medical team must adopt fast alternative measures. The methods used to summarize protection against on-ship infectious agents included a scientific literature review and a web search. The fields of the review were maritime, health, and technology sources. Special attention was paid to material dealing with risks and threats of on-ship penetration by infectious agents, on-ship infection prevalence thresholds, and rapid diagnostic screens. The Bayes rule and the law of large numbers were applied to the analysis, for large on-ship populations, of RFT indications of crossing of an infection prevalence threshold. The increasing risk of serious on-ship infection—either accidental or purposeful—calls for a multi-layered protection approach. RFTs are a key part of the outer layer of such a defense. Well-designed and well-administered RFTs provide several advantages for defense against on-ship infection: low-cost, non-invasive, fast, and focuses on a drastically smaller number of infection possibilities. 相似文献
305.
The brittleness analysis and important nodes detection have been a hot spot in the complex networks. How to get the overall feature of the whole network and how to find out some important nodes are requisites to solve these problems. In this paper, we adopt the trace of the adjacency matrix and the centrality of the complex networks to give a quantitative and qualitative analysis of networks being studied. Results show that the k-shell plays a more important role than the degree centrality and the betweenness in finding important nodes, and it can also be used to give direction on the immunization and maintenance of complex networks. 相似文献
306.
In this paper, a novel approach for service substitutions based on the service type in terms of its interface type and behavior semantics is proposed. In order to analyze and verify behavior-consistent service substitutions in dynamic environments, we first present a formal language to describe services from control-flow perspective, then introduce a type and effect system to infer conservative approximations of all possible behaviors of these services. The service behaviors are represented by concurrent behavior expressions (CBEs). Built upon the interpretation of CBEs, behavior-consistent service substitutions are defined and analyzed by subtyping technology. The correctness of the analysis approach is guaranteed by type safety theorem, which is mechanically proved in the Coq proof assistant. Finally, applications in web services show that our method is effective and feasible. 相似文献
307.
Michael Duncan 《Transportation》2011,38(2):363-382
Carsharing is a vehicle sharing service for those with occasional need of private transportation. Transportation planners
are beginning to see great potential for carsharing in helping to create a more diversified and sustainable transport system.
While it has grown quickly in the US in recent years, it is still far from the level where it can deliver significant aggregate
benefits. A key element to the potential growth of carsharing is its ability to provide cost savings to those who adopt it
in favor of vehicle ownership. This research seeks to quantify these potential cost savings. The costs of carsharing and vehicle
ownership are compared based on actual vehicle usage patterns from a large survey of San Francisco Bay Area residents. The
results of this analysis show that a significant minority of Bay Area households own a vehicle with a usage pattern that carsharing
could accommodate at a lower cost. Further research is required to indentify how these cost savings translate to the adoption
of carsharing. 相似文献
308.
国内已开发出多种11-12m长的低入口城市客车,而市场需求量大的8m长低入口城市客车还是空白.本文应用轮顶悬架前桥及短后悬结构专利技术,成功开发出低成本的8m长短后悬低入口城市客车. 相似文献
309.
A digital signature with message recovery is a signature that the message itself (or partial of the message) is not required
to be transmitted together with the signature. It has the advantage of small data size of communication comparing with the
traditional digital signatures. In this paper, combining both advantages of the message recovery signatures and the certificateless
cryptography, we propose the first certificatelss signature scheme with message recovery. The remarkable feature of our scheme
is that it can achieve Girault’s Level-3 security while the conventional certificateless signature scheme only achieves Level-2
security. The security of the scheme is rigorously proved in the random oracle model based on the hardness of the k bilinear Diffie-Hellman inverse (k-BDHI) problem. 相似文献
310.
User selection is necessary for multiuser multiple-input multiple-output (MIMO) downlink systems with block diagonalization
(BD) due to the limited free spatial transmit dimensions. The pure user selection algorithms can be improved by performing
receive antenna selection (RAS) to increase sum rate. In this paper, a joint user and antenna selection algorithm, which performs
user selection for sum rate maximization in the first stage and then performs antenna selection in the second stage, is proposed.
The antenna selection process alternately drops one antenna with the poorest channel quality based on maximum determinant
ranking (MDR) from the users selected during the first stage and activates one antenna with the maximum norm of projected
channel from the remaining users. Simulation results show that the proposed algorithm significantly outperforms the algorithm
only performing user selection as well as the algorithm combining user selection with MDR receive antenna selection in terms
of sum rate. 相似文献