首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2580篇
  免费   19篇
公路运输   392篇
综合类   858篇
水路运输   834篇
铁路运输   139篇
综合运输   376篇
  2024年   1篇
  2023年   5篇
  2022年   11篇
  2021年   21篇
  2020年   17篇
  2019年   7篇
  2018年   342篇
  2017年   296篇
  2016年   261篇
  2015年   17篇
  2014年   31篇
  2013年   36篇
  2012年   106篇
  2011年   242篇
  2010年   261篇
  2009年   99篇
  2008年   237篇
  2007年   190篇
  2006年   84篇
  2005年   91篇
  2004年   64篇
  2003年   76篇
  2002年   27篇
  2001年   11篇
  2000年   16篇
  1999年   7篇
  1998年   6篇
  1997年   6篇
  1996年   2篇
  1995年   4篇
  1994年   7篇
  1993年   3篇
  1992年   3篇
  1991年   2篇
  1990年   4篇
  1989年   1篇
  1987年   1篇
  1986年   2篇
  1984年   2篇
排序方式: 共有2599条查询结果,搜索用时 62 毫秒
251.
Collaborative spectrum sensing is proposed to improve the detection performance in cognitive radio (CR) networks. However, most of the current collaborative sensing schemes are vulnerable to the interference of the malicious secondary users (SUs). In this paper we propose a reputation-based collaborative spectrum sensing scheme to improve the security of cooperative sensing by mitigating the impacts of misbehaviors. The fusion center calculates the reputation rating of each SU according to their history reports to weight their sensing results in the proposed scheme. We analyze and evaluate the performance of the proposed scheme and its advantages over previous schemes in expansibility and integrity. Simulation results show that the proposed scheme can minimize the harmful influence from malicious SUs.  相似文献   
252.
Based on the analysis of heat transfer mechanics, physical and chemical change of pellet drying and preheating process in grate, the mathematical model is established and solved by three-diagonal matrix algorithm. With Visual Basic 6.0 a simulation software is developed. The model is verified by measurements at a domestic pellet plant, and the temperature distribution of pellet bed is gained. Meanwhile, the influence of different operation parameters on the pellet thermal process is studied. The results can be taken as a basis of practical production control and the grate optimizing design.  相似文献   
253.
针对均匀流场中三维等高型陷落腔因分离流而产生的流激振荡问题开展了系列的实验研究。实验过程中分别考虑了来流攻角为0°和15°时、雷诺数变化范围(Re=2.06.105~1.16.106)时三维等高型陷落腔的流激振荡特性。实验中分别测量了三维腔体侧壁周向及垂向流体压力,在分析腔体内稳态压力和脉动压力的周向、垂向分布规律及腔口剪切层自持振荡特性的基础上,研究了攻角对流体压力分布和剪切层振荡频率特性的影响。实验结果表明:均匀流场中三维陷落腔内部压力分布复杂且当雷诺数大于某值时腔体内稳态压力全都呈现出负压,同时来流攻角的增加使腔口导边、随边和腔体内稳态压力明显地减小,顶流点处的稳态压力随相对高度增加先减小后增大。攻角的增加使剪切层振荡频率减小,但并未影响剪切层振频无量纲St数随流速的变化规律。  相似文献   
254.
A mechanical model of visco-elastic material is established in order to investigate viscous effect in dynamic growing crack-tip field of mode Ⅱ. It is shown that in stable creep growing phase, elastic deformation and viscous deformation are equally dominant in the near-tip field, the stress and strain have the same singularity, namely, (σε) ∝r^-1/(n-1). The asymptotic solutions of separatied variables of stress, stain and displacement in crack-tip field are obtained by asymptotic analysis, and the results of numerical value of stress and strain in crack-tip field are obtained by shooting method. Through numerical calculation, it is shown that the near-tip fields are mainly governed by the creep exponent n and Mach number M. By the asymptotic analysis to the crack-tip field, the fracture criterion of mode Ⅱ dynamic growing crack of visco-elastic materials is put forward from the point of view of strain.  相似文献   
255.
Distributed information systems require complex access control which depends upon attributes of protected data and access policies. Traditionally, to enforce the access control, a file server is used to store all data and act as a reference to check the user. Apparently, the drawback of this system is that the security is based on the file server and the data are stored in plaintext. Attribute-based encryption (ABE) is introduced first by Sahai and Waters and can enable an access control mechanism over encrypted data by specifying the users’ attributes. According to this mechanism, even though the file server is compromised, we can still keep the security of the data. Besides the access control, user may be deprived of the ability in some situation, for example paying TV. More previous ABE constructions are proven secure in the selective model of security that attacker must announce the target he intends to attack before seeing the public parameters. And few of previous ABE constructions realize revocation of the users’ key. This paper presents an ABE scheme that supports revocation and has full security in adaptive model. We adapt the dual system encryption technique recently introduced by Waters to ABE to realize full security.  相似文献   
256.
Aiming at the problem that the fast tracking algorithm using spatio-temporal context (STC) will inevitably lead to drift and even lose the target in long-term tracking, a new algorithm based on spatio-temporal context that integrates long-term tracking with detecting is proposed in this paper. We track the target by the fast tracking algorithm, and the cascaded search strategy is introduced to the detecting part to relocate the target if the fast tracking fails. To a large extent, the proposed algorithm effectively improves the accuracy and stability of long-term tracking. Extensive experimental results on benchmark datasets show that the proposed algorithm can accurately track and relocate the target though the target is partially or completely occluded or reappears after being out of the scene.  相似文献   
257.
数值仿真与模型风洞试验相结合研究了典型工况下两车队列中尾车发动机舱盖气动特性和两车间隔区域的流场,对比了缩比模型和实车模型对应雷诺数下车辆队列的流动形态。缩比模型仿真结果与风洞试验结果一致表明采用数值方法的可行。对比不同雷诺数下车辆队列气动特性发现,缩比模型与实车模型发动机舱盖表面平均静压分布基本相同,但在纵向对称面上,实车模型的前车尾迹比缩比模型更加上扬,底部区域气流速度更高。非定常条件下,实车模型前车尾涡相对尺度明显小于缩比模型,且扩散得更充分,尾迹区涡的分布状态更加混沌,发动机舱盖表面脉动能量的分布更加混乱。涡在两车间隔区域的运动并非简单的移动,而是一个由涡破裂、涡配对和涡融合构成的复杂过程。  相似文献   
258.
Circuit net list bipartitioning using simulated annealing technique has been proposed in the paper. The method converges asymptotically and probabilistically to global optimization. The circuit net list is partitioned into two partitions such that the number of interconnections between the partitions is minimized. The proposed method begins with an innovative clustering technique to obtain a good initial solution. Results obtained show the versatility of the proposed method in solving non polynomial hard problems of circuit net list partitioning and show an improvement over those available in literature.  相似文献   
259.
In a coil box between the roughing and finishing stands on a hot strip mill, a problem has been encountered that the entry region of the plate touches the bending rolls and deforms. As a result, the defective coil occurs. The condition of plate bending, which forms a new deformation feature in coiling, is analyzed. In this paper, the authors focus on the research of the effects of coiling parameters, such as the thickness of plate, roll speed and feeding speed of plate in coil box, and on specific plate bending. A finite element method is developed to simulate this coiling process. Based on numerical simulation, the effects of the coiling parameters on the mechanics and deformation of the bending plate are obtained. Numerical simulation tests have verified the validity of the developed model.  相似文献   
260.
A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the range of a specified reader so that an off-line verifier can verify the proofs later. This proof has found several interesting applications. However, many existing RFID yoking schemes are vulnerable to replay attacks. To overcome the weaknesses, Cho et al. proposed a new RFID yoking proof protocol and a new grouping protocol. Unfortunately, Cho et al.’s schemes are still vulnerable to replay attacks. In this paper, in addition to demonstrating weaknesses, we further discuss the rationale behind these weaknesses to provide a guide line for designing secure RFID yoking schemes. Based on the guide line, we propose a new RFID yoking scheme and a new RFID grouping scheme. Performance evaluation shows that our scheme outperforms its counterparts.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号