首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2412篇
  免费   8篇
公路运输   342篇
综合类   781篇
水路运输   811篇
铁路运输   107篇
综合运输   379篇
  2022年   12篇
  2021年   20篇
  2020年   21篇
  2019年   5篇
  2018年   343篇
  2017年   292篇
  2016年   253篇
  2015年   23篇
  2014年   28篇
  2013年   27篇
  2012年   92篇
  2011年   241篇
  2010年   261篇
  2009年   92篇
  2008年   223篇
  2007年   183篇
  2006年   46篇
  2005年   83篇
  2004年   57篇
  2003年   64篇
  2002年   23篇
  2001年   6篇
  2000年   10篇
  1999年   4篇
  1998年   1篇
  1997年   1篇
  1996年   2篇
  1995年   2篇
  1994年   3篇
  1990年   2篇
排序方式: 共有2420条查询结果,搜索用时 906 毫秒
761.
Robust principal component analysis(PCA) is widely used in many applications, such as image processing, data mining and bioinformatics. The existing methods for solving the robust PCA are mostly based on nuclear norm minimization. Those methods simultaneously minimize all the singular values, and thus the rank cannot be well approximated in practice. We extend the idea of truncated nuclear norm regularization(TNNR) to the robust PCA and consider truncated nuclear norm minimization(TNNM) instead of nuclear norm minimization(NNM). This method only minimizes the smallest N-r singular values to preserve the low-rank components, where N is the number of singular values and r is the matrix rank. Moreover, we propose an effective way to determine r via the shrinkage operator. Then we develop an effective iterative algorithm based on the alternating direction method to solve this optimization problem. Experimental results demonstrate the efficiency and accuracy of the TNNM method. Moreover, this method is much more robust in terms of the rank of the reconstructed matrix and the sparsity of the error.  相似文献   
762.
It is a rather challenging project to seek the amount of funds raised by funds-raising companies. This paper is focused on China private equity funds that have succeeded in raising their funds. The grey systemic model is applied in the research and a formula is established for the law of fund-raising of the private equity funds in order to sum up the capacity of China private equity investment funds and to establish a model accordingly.  相似文献   
763.
Modern highly reliable products may have two or more quality characteristics (QCs) because of their complex structures and abundant functions. Relations between the QCs should be considered when assessing the reliability of these products. This paper conducts a Bayesian analysis for a bivariate constant-stress accelerated degradation model based on the inverse Gaussian (IG) process. We assume that the product considered has two QCs and each of the QCs is governed by an IG process. The relationship between the QCs is described by a Frank copula function. We also assume that the stress on the products affects not only the parameters of the IG processes, but also the parameter of the Frank copula function. The Bayesian MCMC method is developed to calculate the maximum likelihood estimators (MLE) of the model parameters. The reliability function and the mean-time-to-failure (MTTF) are estimated through the calculation of the posterior samples. Finally, a simulation example is presented to illustrate the proposed bivariate constant-stress accelerated degradation model.  相似文献   
764.
为了实时准确地监控交直流混合微电网中各电力设备运行状态的需要,促进微电网智能化建设进程,采用现代信息、通信和控制技术,基于MGSCADA软件设计微电网监控终端.论文首先对微电网的实际架构展开监控系统功能需求分析,再基于MGSCADA软件进行通信建模、MMS服务数据库设计,最后应用于交直流混合微电网实验平台进行测试.测试结果表明,该监控终端可实时精确地测量各电气参数,经数据库进行存储,用户可通过良好的人机交互界面实时观测各设备运行状态,并能够实现微电网的优化控制,确保整个微电网系统安全稳定运行,满足功能设计需求.  相似文献   
765.
Whereas the Marine Insurance Act 1906 provides substantial detail about total losses, very little is provided in relation to piracy in the said statute. The recent judgments in Masefield v Amlin by Steel J ([2010] 1Lloyd's Rep. IR 345) and then by the English Court of Appeal ([2011] EWCA Civ 24) have highlighted the difficulties associated with determining whether a seizure of the subject-matter of insurance, in this case cargo, by pirates, demanding a ransom, can give rise to a claim for a total loss. This is a very important matter which also raises issues of legality and public policy. This article examines the implications of this judgment against the backdrop of the English marine insurance definition of piracy and the intricacies of the law relating to constructive and actual total losses. The article concludes with the suggestion that possibly the marine insurance definition of piracy should tally with that in the domain of public international law, and further, that legislative intervention should be considered for the purpose of ascertaining the point in time whether and when seizure by pirates can constitute a total loss.  相似文献   
766.
Piracy is one of the most frequent maritime threats. However, despite the importance of how maritime piracy is to be reduced, it is substantially less investigated than maritime safety. Piracy off Somalia is the most investigated case of piracy, but those results are not necessarily generalizable. Piracy off West Africa has been shown to be more diverse, successful and dangerous. This study investigates and analyses piracy off West Africa with the aim to understand how different operations and security measures affect the consequences of piracy. This study has identified several different intents and shows that most attacks are relatively close to shore and correspond to areas of high ship density. Attacks with the intent of theft at night-time are generally performed close to shore, and more complicated attacks against ships under way are more common during daytime and farther from shore. Five types of measures are found to have high effectiveness if the attack is detected during approach; after boarding, only two measures have high effectiveness. Of the effective measures, it can be concluded that all but one are dependent on detecting the attack. Therefore, detecting the pirates is key but must be accompanied by a set of measures because no measure alone can protect a ship given the operational conditions off West Africa. The risks associated with piracy off West Africa are estimated to be of the same magnitude as the risks posed by Somali piracy at its peak.  相似文献   
767.
Robust public transport networks are important, since disruptions decrease the public transport accessibility of areas. Despite this importance, the full passenger impacts of public transport network vulnerability have not yet been considered in science and practice. We have developed a methodology to identify the most vulnerable links in the total, multi-level public transport network and to quantify the societal costs of link vulnerability for these identified links. Contrary to traditional single-level network approaches, we consider the integrated, total multi-level PT network in the identification and quantification of link vulnerability, including PT services on other network levels which remain available once a disturbance occurs. We also incorporate both exposure to large, non-recurrent disturbances and the impacts of these disturbances explicitly when identifying and quantifying link vulnerability. This results in complete and realistic insights into the negative accessibility impacts of disturbances. Our methodology is applied to a case study in the Netherlands, using a dataset containing 2.5 years of disturbance information. Our results show that especially crowded links of the light rail/metro network are vulnerable, due to the combination of relatively high disruption exposure and relatively high passenger flows. The proposed methodology allows quantification of robustness benefits of measures, in addition to the costs of these measures. Showing the value of robustness, our work can support and rationalize the decision-making process of public transport operators and authorities regarding the implementation of robustness measures.  相似文献   
768.
The deep understanding on sand and sand dunes scale can be useful to reveal the formation mechanism of the sandstorm for early sandstorm forecast. The current sandstorm observation methods are mainly based on conventional meteorological station and satellites remote sensing, which are difficult to acquire sand scale information. A wireless sensing network is implemented in the hinterland of desert, which includes ad hoc network, sensor, global positioning system (GPS) and system integration technology. The wireless network is a three-layer architecture and daisy chain topology network, which consists of control station, master robots and slave robots. Every three robots including one master robot and its two slave robots forms an ad hoc network. Master robots directly communicate with radio base station. Information will be sent to remote information center. Data sensing system including different kinds of sensors and desert robots is developed. A desert robot is designed and implemented as unmanned probing movable nodes and sensors’ carrier. A new optical fiber sensor is exploited to measure vibration of sand in particular. The whole system, which is delivered to the testing field in hinterland of desert (25 km far from base station), has been proved efficient for data acquisition.  相似文献   
769.
邹明雷  谌婷  杨康  黄友桥 《船电技术》2019,39(10):54-57
为解决变压器选择性保护指导方法与其断路器选型的匹配性差、船规对电推船舶母线保护及选择性的指导描述不多的问题,提出了基于厂家选择性匹配表选型的变压器选择性分析方法,及基于低电压穿越技术基础上的母线分段差动保护作为主保护、断路器间时间电流选择性或区域选择性作为后备保护的母线选择性分析方法。通过实船测试,采用母线分段差动保护的方法,提高了母线短路时的选择性能力,降低了推进逆变器的低电压穿越时间要求。  相似文献   
770.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号