全文获取类型
收费全文 | 4844篇 |
免费 | 139篇 |
专业分类
公路运输 | 924篇 |
综合类 | 1568篇 |
水路运输 | 1429篇 |
铁路运输 | 606篇 |
综合运输 | 456篇 |
出版年
2024年 | 8篇 |
2023年 | 10篇 |
2022年 | 66篇 |
2021年 | 79篇 |
2020年 | 101篇 |
2019年 | 54篇 |
2018年 | 373篇 |
2017年 | 320篇 |
2016年 | 291篇 |
2015年 | 104篇 |
2014年 | 120篇 |
2013年 | 187篇 |
2012年 | 282篇 |
2011年 | 415篇 |
2010年 | 481篇 |
2009年 | 240篇 |
2008年 | 431篇 |
2007年 | 367篇 |
2006年 | 276篇 |
2005年 | 272篇 |
2004年 | 109篇 |
2003年 | 112篇 |
2002年 | 61篇 |
2001年 | 61篇 |
2000年 | 54篇 |
1999年 | 29篇 |
1998年 | 16篇 |
1997年 | 10篇 |
1996年 | 22篇 |
1995年 | 4篇 |
1994年 | 5篇 |
1993年 | 4篇 |
1992年 | 7篇 |
1991年 | 5篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1988年 | 2篇 |
1985年 | 1篇 |
1984年 | 1篇 |
排序方式: 共有4983条查询结果,搜索用时 15 毫秒
991.
为统计旅游交通的客运量,分析公路交通运输需求,优化运输组织,合理构建“快进慢游”综合交通旅游网络,研究提出基于手机信令数据的游客识别与出行轨迹匹配方法。通过划定景区边界,设置停留时间阈值,识别手机用户的游客身份;同时,借助地图工具批量计算信令发生位置间的出行路线与行程时间,匹配实际公路网。实例分析结果表明,手机信令数据能呈现手机用户的出行轨迹,且信令数据的位置轨迹与公路线位走向结合密切。在人们越来越依赖地图导航软件规划出行路径的背景下,利用该方法能更准确地识别景区游客并估计游客往来景区的出行路径。 相似文献
992.
城市高坪地区通常存在区域交通不畅的问题,出口道路经常制约着城市高坪地区的经济、文化发展.该文结合兰州市彭家坪T210#路路线选择,总结了城市面上高坪地区选线的几点经验,可供道路专业人员参考. 相似文献
993.
Bevan Marten 《WMU Journal of Maritime Affairs》2011,10(1):45-61
This article discusses the enforcement of shipping standards, with a particular focus on Part XII of UNCLOS. Section 6 of Part XII contains the only comprehensive set of vessel-related enforcement provisions in the Convention, but the Part’s scope is limited to “the preservation and protection of the marine environment.” Therefore, not all shipping standards fall clearly within Part XII’s ambit, including those centered on safety, security, and crewing considerations. The enforcement provisions of Section 6 are favorable to flag states and their vessels, and Section 7 contains a number of safeguards for their benefit, so it is in the interests of these parties to have coastal state enforcement governed by Part XII. However, the ability of coastal states to establish and enforce shipping standards that apply within the territorial sea extends to more than just environmental matters. The result is that different standards give rise to different enforcement powers, depending on the maritime zone in which a vessel is located, even if those standards arise from the same international agreement. It is suggested that to remedy these problems, UNCLOS would need to be amended in order to provide a comprehensive enforcement regime for the enforcement of shipping standards. 相似文献
994.
Hydrostatic stresses of copper dual-damascene interconnects are calculated by a commercial finite element software in this paper. The analytical work is performed to examine the effects of different low-k (k is permittivity) dielectrics, barrier layer and aspect ratio of via on hydrostatic stress distribution in the copper interconnects. The results of calculation indicate that the hydrostatic stresses are highly non-uniform throughout the copper interconnects and the highest tensile hydrostatic stress exists on the top interface of lower level interconnect near via. Both the high coefficient of thermal expansion and the low elastic modulus of the low-k dielectrics and barrier layer can decrease the highest hydrostatic stress on the top interface, which can improve the reliability of the copper interconnects. 相似文献
995.
Distributed information systems require complex access control which depends upon attributes of protected data and access policies. Traditionally, to enforce the access control, a file server is used to store all data and act as a reference to check the user. Apparently, the drawback of this system is that the security is based on the file server and the data are stored in plaintext. Attribute-based encryption (ABE) is introduced first by Sahai and Waters and can enable an access control mechanism over encrypted data by specifying the users’ attributes. According to this mechanism, even though the file server is compromised, we can still keep the security of the data. Besides the access control, user may be deprived of the ability in some situation, for example paying TV. More previous ABE constructions are proven secure in the selective model of security that attacker must announce the target he intends to attack before seeing the public parameters. And few of previous ABE constructions realize revocation of the users’ key. This paper presents an ABE scheme that supports revocation and has full security in adaptive model. We adapt the dual system encryption technique recently introduced by Waters to ABE to realize full security. 相似文献
996.
A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the range of a specified reader so that an off-line verifier can verify the proofs later. This proof has found several interesting applications. However, many existing RFID yoking schemes are vulnerable to replay attacks. To overcome the weaknesses, Cho et al. proposed a new RFID yoking proof protocol and a new grouping protocol. Unfortunately, Cho et al.’s schemes are still vulnerable to replay attacks. In this paper, in addition to demonstrating weaknesses, we further discuss the rationale behind these weaknesses to provide a guide line for designing secure RFID yoking schemes. Based on the guide line, we propose a new RFID yoking scheme and a new RFID grouping scheme. Performance evaluation shows that our scheme outperforms its counterparts. 相似文献
997.
Circuit net list bipartitioning using simulated annealing technique has been proposed in the paper. The method converges asymptotically and probabilistically to global optimization. The circuit net list is partitioned into two partitions such that the number of interconnections between the partitions is minimized. The proposed method begins with an innovative clustering technique to obtain a good initial solution. Results obtained show the versatility of the proposed method in solving non polynomial hard problems of circuit net list partitioning and show an improvement over those available in literature. 相似文献
998.
Of different model-based methods in vision based human tracking, many state of the art works focus on the stochastic optimization method to search in a very high dimensional space and try to find the optimal solution according to a proper likelihood function. Seldom works perform a framework of interactive multiple models (IMM) to track a human for challenging problems, such as uncertainty of motion styles, imprecise detection of feature points and ambiguity of joint location. This paper presents a two-layer filter framework based on IMM to track human motion. First, a method of model based points location is proposed to detect key feature points automatically and the filter in the first layer is performed to estimate the undetected points. Second, multiple models of motion are learned by the prior motion data with ridge regression and the IMM algorithm is used to estimate the quaternion vectors of joints rotation. Finally, experiments using real images sequences, simulation videos and 3D voxel data demonstrate that this human tracking framework is efficient. 相似文献
999.
Democratic group signature (DGS) is a group-oriented primitive with great flexibilities, i.e., no group manager, anonymity, and traceability. In a DGS scheme with (t, n)-threshold traceability, any subset of not less than t members can jointly reveal the identity of the signer while preserving security even in the presence of an active adversary can corrupt up to t − 1 group members. This paper proposes an efficient DGS scheme. We use publicly verifiable secret sharing (PVSS) to distribute the trapdoor via which the real signer is revealed. The computation cost and communication overhead of our DGS signatures are greatly reduced, compared with the existing work. For example, the size of the resulting signature contains only 2n + 1 elements of Z q , except the PVSS output. 相似文献
1000.
A novel method toward color image segmentation is proposed based on edge linking and region grouping. Firstly, the edges extracted by the Canny detector are linked to form regions. Each of the end points of edges is connected by a direct line to the nearest pixel on another edge segment within a sub-window. A new distance is defined based on the feature that the edge tends to preserve its original direction. By sampling the lines to the image, the image is over-segmented to labeled regions. Secondly, the labeled regions are grouped both locally and globally. A decision tree is constructed to decide the importance of properties that affect the merging procedure. Finally, the result is refined by user’s selection of regions that compose the desired object. Experiments show that the method can effectively segment the object and is much faster than the state-of-the-art color image segmentation methods. 相似文献