全文获取类型
收费全文 | 996篇 |
免费 | 20篇 |
专业分类
公路运输 | 346篇 |
综合类 | 233篇 |
水路运输 | 226篇 |
铁路运输 | 169篇 |
综合运输 | 42篇 |
出版年
2024年 | 2篇 |
2023年 | 2篇 |
2022年 | 16篇 |
2021年 | 30篇 |
2020年 | 26篇 |
2019年 | 5篇 |
2018年 | 15篇 |
2017年 | 7篇 |
2016年 | 5篇 |
2015年 | 21篇 |
2014年 | 37篇 |
2013年 | 41篇 |
2012年 | 57篇 |
2011年 | 62篇 |
2010年 | 64篇 |
2009年 | 91篇 |
2008年 | 83篇 |
2007年 | 116篇 |
2006年 | 125篇 |
2005年 | 59篇 |
2004年 | 19篇 |
2003年 | 18篇 |
2002年 | 18篇 |
2001年 | 16篇 |
2000年 | 16篇 |
1999年 | 15篇 |
1998年 | 7篇 |
1997年 | 5篇 |
1996年 | 10篇 |
1995年 | 5篇 |
1994年 | 1篇 |
1993年 | 3篇 |
1992年 | 1篇 |
1991年 | 8篇 |
1990年 | 4篇 |
1989年 | 2篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1984年 | 1篇 |
排序方式: 共有1016条查询结果,搜索用时 15 毫秒
991.
992.
在弹塑性理论的基础上,考虑了材料性能随温度的变化,应用J2流动理论导出了高温下钢筋混凝土构件弹塑性增量本构模型,编制了该模型的有限元求解程序.该模型具有明确的物理意义,表达形式规范,便于数值手段实现.数值计算结果与现有的试验模型基本吻合. 相似文献
993.
994.
Numerical study of ice-induced loads on ship hulls 总被引:1,自引:0,他引:1
A numerical model is introduced in this paper to investigate both global and local ice loads on ship hulls. This model is partly based on empirical data, by which the observed phenomena of continuous icebreaking can be well reproduced. In the simulation of a full-scale icebreaking trial, the interdependence between the ice load and the ship’s motion is considered, and the three degree-of-freedom rigid body equations of surge, sway and yaw are solved by numerical integration. The variations in the level ice thickness and in the strength properties of ice can also be taken into account. The simulated ice loads on ship hulls are discussed through two case studies, in which the ship’s performance, the statistics of ice-induced frame loads, and the spatial distribution of ice loads around the hull are analyzed and compared with field measurements. As far as we know the present paper is the first to integrate all the features above. It is hoped that further studies on this numerical model can supplement the field and laboratory measurements in establishing a design basis for the ice-going ships especially for ships navigating in the first-year ice. 相似文献
995.
996.
Assessing the impact of characteristics of the built environment on travel behavior can yield valuable tools for land use
and transportation planning. Of particular interest are planning models that can estimate the effects of ‘smart growth’ planning.
In this paper, a post-processor method of quantifying and searching for relationships among many aspects of travel behavior
and the built environment is developed and applied to the Buffalo, NY area. A wide scope of travel behavior is examined, and
over 50 variables, many of which are based on high-detail data sources, are examined for potentially quantifying the built
environment. Linear modeling is then used to relate travel behavior and the built environment, and the resulting models may
be applied in a post-processor fashion to travel models to provide some measure of sensitivity to built environment modifications.
The study’s findings demonstrate that mode choice is highly correlated to measures of the built environment, and that many
of the principles of smart growth appear to be a valid way to encourage non-vehicle travel. Home-based VHT and VMT appear
to be affected by the built environment to a lesser degree. 相似文献
997.
998.
基于Mindlin问题的位移解导出了拉拔荷载作用下砂浆锚杆的剪应力分布和轴力分布的弹性解。依托岢临高速公路某黄土隧道,通过现场试验得出边墙系统锚杆的极限拉拔力,分析了拉拔荷载作用下边墙系统锚杆的受力特性;探讨了不同土体性质下砂浆锚杆剪应力及轴力的分布形式。研究成果为黄土隧道系统锚杆的设计和优化提供了理论依据,对设计和施工具有指导意义。 相似文献
999.
1000.
Cloud computing provides a wide platform for information sharing. Users can access data and retrieve service easily and quickly. Generally, the data in cloud are transferred with encrypted form to protect the information. As an important technology of cloud security, access control should take account of multi-factor and ciphertext to satisfy the complex requirement for cloud data protection. We propose a proxy re-encryption (PRE) based multi-factor access control (PMAC) for cipher text in the above background. The PMAC adapts to the privacy and the protection of data confidently. We explain the motivation and some assumptions of PMAC at first. Then we define system model and algorithm. The system model and algorithm show how to create the data with corresponding accessing policy and how to grant and revoke the permission. 相似文献