全文获取类型
收费全文 | 2412篇 |
免费 | 8篇 |
专业分类
公路运输 | 342篇 |
综合类 | 781篇 |
水路运输 | 811篇 |
铁路运输 | 107篇 |
综合运输 | 379篇 |
出版年
2022年 | 12篇 |
2021年 | 20篇 |
2020年 | 21篇 |
2019年 | 5篇 |
2018年 | 343篇 |
2017年 | 292篇 |
2016年 | 253篇 |
2015年 | 23篇 |
2014年 | 28篇 |
2013年 | 27篇 |
2012年 | 92篇 |
2011年 | 241篇 |
2010年 | 261篇 |
2009年 | 92篇 |
2008年 | 223篇 |
2007年 | 183篇 |
2006年 | 46篇 |
2005年 | 83篇 |
2004年 | 57篇 |
2003年 | 64篇 |
2002年 | 23篇 |
2001年 | 6篇 |
2000年 | 10篇 |
1999年 | 4篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1990年 | 2篇 |
排序方式: 共有2420条查询结果,搜索用时 906 毫秒
761.
Robust principal component analysis(PCA) is widely used in many applications, such as image processing, data mining and bioinformatics. The existing methods for solving the robust PCA are mostly based on nuclear norm minimization. Those methods simultaneously minimize all the singular values, and thus the rank cannot be well approximated in practice. We extend the idea of truncated nuclear norm regularization(TNNR) to the robust PCA and consider truncated nuclear norm minimization(TNNM) instead of nuclear norm minimization(NNM). This method only minimizes the smallest N-r singular values to preserve the low-rank components, where N is the number of singular values and r is the matrix rank. Moreover, we propose an effective way to determine r via the shrinkage operator. Then we develop an effective iterative algorithm based on the alternating direction method to solve this optimization problem. Experimental results demonstrate the efficiency and accuracy of the TNNM method. Moreover, this method is much more robust in terms of the rank of the reconstructed matrix and the sparsity of the error. 相似文献
762.
It is a rather challenging project to seek the amount of funds raised by funds-raising companies. This paper is focused on China private equity funds that have succeeded in raising their funds. The grey systemic model is applied in the research and a formula is established for the law of fund-raising of the private equity funds in order to sum up the capacity of China private equity investment funds and to establish a model accordingly. 相似文献
763.
Modern highly reliable products may have two or more quality characteristics (QCs) because of their complex structures and abundant functions. Relations between the QCs should be considered when assessing the reliability of these products. This paper conducts a Bayesian analysis for a bivariate constant-stress accelerated degradation model based on the inverse Gaussian (IG) process. We assume that the product considered has two QCs and each of the QCs is governed by an IG process. The relationship between the QCs is described by a Frank copula function. We also assume that the stress on the products affects not only the parameters of the IG processes, but also the parameter of the Frank copula function. The Bayesian MCMC method is developed to calculate the maximum likelihood estimators (MLE) of the model parameters. The reliability function and the mean-time-to-failure (MTTF) are estimated through the calculation of the posterior samples. Finally, a simulation example is presented to illustrate the proposed bivariate constant-stress accelerated degradation model. 相似文献
764.
为了实时准确地监控交直流混合微电网中各电力设备运行状态的需要,促进微电网智能化建设进程,采用现代信息、通信和控制技术,基于MGSCADA软件设计微电网监控终端.论文首先对微电网的实际架构展开监控系统功能需求分析,再基于MGSCADA软件进行通信建模、MMS服务数据库设计,最后应用于交直流混合微电网实验平台进行测试.测试结果表明,该监控终端可实时精确地测量各电气参数,经数据库进行存储,用户可通过良好的人机交互界面实时观测各设备运行状态,并能够实现微电网的优化控制,确保整个微电网系统安全稳定运行,满足功能设计需求. 相似文献
765.
Gotthard Gauci 《WMU Journal of Maritime Affairs》2012,11(1):115-128
Whereas the Marine Insurance Act 1906 provides substantial detail about total losses, very little is provided in relation
to piracy in the said statute. The recent judgments in Masefield v Amlin by Steel J ([2010] 1Lloyd's Rep. IR 345) and then by the English Court of Appeal ([2011] EWCA Civ 24) have highlighted the
difficulties associated with determining whether a seizure of the subject-matter of insurance, in this case cargo, by pirates,
demanding a ransom, can give rise to a claim for a total loss. This is a very important matter which also raises issues of
legality and public policy. This article examines the implications of this judgment against the backdrop of the English marine
insurance definition of piracy and the intricacies of the law relating to constructive and actual total losses. The article
concludes with the suggestion that possibly the marine insurance definition of piracy should tally with that in the domain
of public international law, and further, that legislative intervention should be considered for the purpose of ascertaining
the point in time whether and when seizure by pirates can constitute a total loss. 相似文献
766.
Hans Liwång 《WMU Journal of Maritime Affairs》2017,16(3):385-403
Piracy is one of the most frequent maritime threats. However, despite the importance of how maritime piracy is to be reduced, it is substantially less investigated than maritime safety. Piracy off Somalia is the most investigated case of piracy, but those results are not necessarily generalizable. Piracy off West Africa has been shown to be more diverse, successful and dangerous. This study investigates and analyses piracy off West Africa with the aim to understand how different operations and security measures affect the consequences of piracy. This study has identified several different intents and shows that most attacks are relatively close to shore and correspond to areas of high ship density. Attacks with the intent of theft at night-time are generally performed close to shore, and more complicated attacks against ships under way are more common during daytime and farther from shore. Five types of measures are found to have high effectiveness if the attack is detected during approach; after boarding, only two measures have high effectiveness. Of the effective measures, it can be concluded that all but one are dependent on detecting the attack. Therefore, detecting the pirates is key but must be accompanied by a set of measures because no measure alone can protect a ship given the operational conditions off West Africa. The risks associated with piracy off West Africa are estimated to be of the same magnitude as the risks posed by Somali piracy at its peak. 相似文献
767.
Robust public transport networks are important, since disruptions decrease the public transport accessibility of areas. Despite this importance, the full passenger impacts of public transport network vulnerability have not yet been considered in science and practice. We have developed a methodology to identify the most vulnerable links in the total, multi-level public transport network and to quantify the societal costs of link vulnerability for these identified links. Contrary to traditional single-level network approaches, we consider the integrated, total multi-level PT network in the identification and quantification of link vulnerability, including PT services on other network levels which remain available once a disturbance occurs. We also incorporate both exposure to large, non-recurrent disturbances and the impacts of these disturbances explicitly when identifying and quantifying link vulnerability. This results in complete and realistic insights into the negative accessibility impacts of disturbances. Our methodology is applied to a case study in the Netherlands, using a dataset containing 2.5 years of disturbance information. Our results show that especially crowded links of the light rail/metro network are vulnerable, due to the combination of relatively high disruption exposure and relatively high passenger flows. The proposed methodology allows quantification of robustness benefits of measures, in addition to the costs of these measures. Showing the value of robustness, our work can support and rationalize the decision-making process of public transport operators and authorities regarding the implementation of robustness measures. 相似文献
768.
The deep understanding on sand and sand dunes scale can be useful to reveal the formation mechanism of the sandstorm for early sandstorm forecast. The current sandstorm observation methods are mainly based on conventional meteorological station and satellites remote sensing, which are difficult to acquire sand scale information. A wireless sensing network is implemented in the hinterland of desert, which includes ad hoc network, sensor, global positioning system (GPS) and system integration technology. The wireless network is a three-layer architecture and daisy chain topology network, which consists of control station, master robots and slave robots. Every three robots including one master robot and its two slave robots forms an ad hoc network. Master robots directly communicate with radio base station. Information will be sent to remote information center. Data sensing system including different kinds of sensors and desert robots is developed. A desert robot is designed and implemented as unmanned probing movable nodes and sensors’ carrier. A new optical fiber sensor is exploited to measure vibration of sand in particular. The whole system, which is delivered to the testing field in hinterland of desert (25 km far from base station), has been proved efficient for data acquisition. 相似文献
769.
770.