首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2208篇
  免费   11篇
公路运输   260篇
综合类   816篇
水路运输   718篇
铁路运输   55篇
综合运输   370篇
  2022年   6篇
  2021年   2篇
  2020年   5篇
  2019年   7篇
  2018年   338篇
  2017年   292篇
  2016年   249篇
  2015年   13篇
  2014年   22篇
  2013年   19篇
  2012年   70篇
  2011年   224篇
  2010年   242篇
  2009年   75篇
  2008年   207篇
  2007年   160篇
  2006年   29篇
  2005年   68篇
  2004年   49篇
  2003年   63篇
  2002年   17篇
  2001年   11篇
  2000年   6篇
  1999年   3篇
  1998年   5篇
  1997年   7篇
  1996年   7篇
  1995年   2篇
  1994年   4篇
  1993年   5篇
  1992年   2篇
  1991年   1篇
  1990年   4篇
  1989年   2篇
  1988年   1篇
  1987年   2篇
排序方式: 共有2219条查询结果,搜索用时 647 毫秒
151.
Democratic group signature (DGS) is a group-oriented primitive with great flexibilities, i.e., no group manager, anonymity, and traceability. In a DGS scheme with (t, n)-threshold traceability, any subset of not less than t members can jointly reveal the identity of the signer while preserving security even in the presence of an active adversary can corrupt up to t − 1 group members. This paper proposes an efficient DGS scheme. We use publicly verifiable secret sharing (PVSS) to distribute the trapdoor via which the real signer is revealed. The computation cost and communication overhead of our DGS signatures are greatly reduced, compared with the existing work. For example, the size of the resulting signature contains only 2n + 1 elements of Z q , except the PVSS output.  相似文献   
152.
厚层基材喷播边坡防护技术研究   总被引:3,自引:2,他引:3  
干旱半干旱地区高速公路路基边坡植被恢复是目前的一项技术难点。分析了厚层基材喷播的概念、原理、材料组成及施工工艺。通过项目实践,提出了适宜西宁地区厚层基材喷播边坡植被恢复的植物材料紫花苜蓿、柠条、老芒麦、披碱草、中华羊茅、碱茅等,分析了植物选择的原理及适当配比,并阐述了厚层基材喷播、覆盖、后期管护等重点和难点技术。能有效解决石质边坡生态和植被恢复的难题。特别是为在高大边坡或难施工、难养护地区提供了实践性技术指导。  相似文献   
153.
This paper examines the out-of-home, weekend, time-use patterns of children aged 5–17 years, with a specific emphasis on their physical activity participation. The impact of several types of factors, including individual and household demographics, neighborhood demographics, built environment characteristics, and activity day variables, on physical activity participation is analyzed using a joint nested multiple discrete–continuous extreme value-binary choice model. The sample for analysis is drawn from the 2000 San Francisco Bay Area Travel Survey. The model developed in the paper can be used to assess the impacts of changing demographics and built environment characteristics on children’s physical activity levels.  相似文献   
154.
铁路桥梁横向刚度的初步研究   总被引:2,自引:0,他引:2  
分析了铁路桥梁横向刚度的内蕴,提出了适用于列车过桥的舒适度表达式,建议以水平挠跨比作为横向刚度的评价尺度。在此基础上,考虑加速度的概率分布,得出了确定允许挠跨比的理论方法,并通过算例予以验证。  相似文献   
155.
世界500强企业的经营活动已纳入国际经济活动之中,以国际市场为舞台,在国外设立分支机构,广泛利用国内外资源,从全球战略出发,在世界市场进行资源优化配置和组合,为寻求在全球范围内的支配和垄断地位,更通过强强联手、跨国兼并来不断壮大实力。世界500强企业在经营中采取的策略,一方面从外部变革,走多元化道路;一方面从部变革,实施“归核战略”。  相似文献   
156.
Realistic simulation of underwater scene is always difficult because of the special and complex vision effects in underwater space. Seabed is an important part of underwater environment. This paper describes the methods for seabed scene simulation based on OpenGL. It includes construction of fluetuant terrain based on the random sinusoidal algorithm, simulation of seabed flicker effect by means of circular texture mapping and generation of turbidity effect by using fog techniques. For the application based on the leading high level 3D development environment-Vega, underwater scene simulation is still a difficulty since there is no module for it. Based on the analysis of Vega software and the research on seabed scene simulation methods, a Vega extending module named “Underwater Space” was created through developing module class and extending lynx interface. The module class was designed through developing DLL written in C . The Lynx was extended through developing keyword configure file, GUI configure file and lynx plug-in DLL. The problem that Vega can‘t simulate underwater space, is elementarily resolved. The results show that this module is efficient, easy using, and the seabed scene images am vivid.  相似文献   
157.
158.
For the applied limitation of the existing threshold decryption schemes based on the (t, n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares. The generation and distribution of private key shares, the encryption, the decryption and the combination are introduced in detail. The validity and security of the scheme are proved and analyzed. Comparisons with the existing schemes show that the proposed scheme is more flexible.  相似文献   
159.
Cluster tools have advantages of shorter cycle times, faster process development, and better yield for less contamination. The sequence of dual-arm cluster tools is a complex logistics process during the semiconductor production. Efficient use of cluster tools is naturally very significant to competitive fab operations. Generating an optimized sequence in a computationally efficient manner and assessing the quality of the requirements to improve the fab production are the key factors for semiconductor manufacturing productivity. The Petri net modeling is introduced to minimize the makespan of the process for the three different logical modes and select a better mode after comparing the makespan among the three logical modes. The tool sequence optimization problem is formulated as optimization firing transition sequences based on the Petri net and then the formulation is converted to be linearly solved by the branch-and-cut method in the standard commercial solver CPLEX. Special methods for the linear conversion are highlighted. Due to the limited calculation time requirement for the real production and the large scale of the problem, special methods for the efficiency tuning are applied according to the characteristics of the problem. Numerical testing is supported by one of the most advanced semiconductor enterprises and the computational results show significant improvement compared with the traditional manual sequence results.  相似文献   
160.
An enhancement-based Poisson denoising method for photon-limited images is presented. The noisy image is firstly pre-processed for enhancing incomplete object information, and then it is denoised while preserving the restored structural details. A variational regularization model based on Euler’s elastica (EE) is proposed for image enhancement pre-processing. A nonlocal total variation (NLTV) regularization model is then employed in the second stage of image denoising. The above two optimization problems are solved by the alternating direction method of multipliers (ADMM). For Poissonian images with low image peak values, experiments demonstrate the validity and efficiency of the proposed method for both restoring geometric structure and removing noise.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号