首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1857篇
  免费   0篇
公路运输   183篇
综合类   656篇
水路运输   651篇
铁路运输   3篇
综合运输   364篇
  2018年   335篇
  2017年   290篇
  2016年   247篇
  2015年   1篇
  2014年   2篇
  2013年   1篇
  2012年   55篇
  2011年   205篇
  2010年   212篇
  2009年   44篇
  2008年   177篇
  2007年   121篇
  2005年   51篇
  2004年   42篇
  2003年   55篇
  2002年   17篇
  2000年   2篇
排序方式: 共有1857条查询结果,搜索用时 0 毫秒
171.
Mixture faults detection is meaningful for gasoline engines because proper mixture is the basic prerequisite for healthy running of a combustion engine. Among existing methods for faults detection, the data-driven trend analysis technique is widely used due to the simplicity and efficiency in time-domain. The CUSUM (Cumulative Sum Of Errors) algorithm is good at real-time trend extraction, but it’s easy to be costly on the fuel trim signal during the engine in normal working conditions, which will increase battery energy consumption because engine failure is rarely occurs. Hence, the conventional treatment methods of artifacts in the CUSUM algorithm are modified by means of decay function and detection time analysis. The thresholds are tuned according to the characteristics of artifacts instead of residual variability, which leads to better results of trend extraction and less computation. Then, the revised CUSUM algorithm is used for monitoring the mixture abnormal behaviors, and the mixture faults can be detected in real time through analyzing the variation features of fuel trim signal. The lightweight faults detector using the advanced CUSUM algorithm (FD-A-CUSUM) is evaluated on the experimental data collected from a Ford engine. The validation results show that while engine works under normal conditions, the computation of FD-A-CUSUM has decreased by 72.79 % in comparison with the detection method using the original CUSUM algorithm (FD-O-CUSUM), and the false alarm ratio of FD-A-CUSUM is 3.37 %. Futhermore, the detection results of FD-A-CUSUM for two leakage faults have achieved 91.18 % test accuracy.  相似文献   
172.
Uncontrolled expansion of combustion wave in spark ignited internal combustion engine causes knock effect which seriously degrades efficiency and lifetime of the engine. Thus, accurate knock detection and control are essential for obtaining a desired performance from the engine. Usually, knock sensor is used to detect this phenomenon but it has limited accuracy especially at engine high-speed rotations because of natural vibration and external noises. In this study an effective method based on Non-Local Mean (NLM) algorithm has been proposed to improve the knock detection accuracy. This method is evaluated based on four different indicators and four engine cylinders. The results show 52.9 % improvement in knock detection. Also feasibility of real time execution of this method based on embedded hardware has been studied.  相似文献   
173.
Sparse signal recovery is a topic of considerable interest, and the literature in this field is already quite immense. Many problems that arise in sparse signal recovery can be generalized as a convex programming with linear conic constraints. In this paper, we present a new proximal point algorithm (PPA) termed as relaxed-PPA (RPPA) contraction method, for solving this common convex programming. More precisely, we first reformulate the convex programming into an equivalent variational inequality (VI), and then efficiently explore its inner structure. In each step, our method relaxes the VI-subproblem to a tractable one, which can be solved much more efficiently than the original VI. Under mild conditions, the convergence of the proposed method is proved. Experiments with l 1 analysis show that RPPA is a computationally efficient algorithm and compares favorably with the recently proposed state-of-the-art algorithms.  相似文献   
174.
To tackle the key-exposure problem in signature settings, this paper introduces a new cryptographic primitive named threshold key-insulated signature (TKIS) and proposes a concrete TKIS scheme. For a TKIS system, at least k out of n helpers are needed to update a user’s temporary private key. On the one hand, even if up to k−1 helpers are compromised in addition to the exposure of any of temporary private keys, security of the non-exposed periods is still assured. On the other hand, even if all the n helpers are compromised, we can still ensure the security of all periods as long as none of temporary private keys is exposed. Compared with traditional key-insulated signature (KIS) schemes, the proposed TKIS scheme not only greatly enhances the security of the system, but also provides flexibility and efficiency.  相似文献   
175.
The wind pressure distribution and wind-induced vibration responses of long-span spatial groined latticed vaults (SGLVs) were numerically simulated, which always are ones of the most important problems in the structural wind resistance design. Incompressible visco-fluid model was introduced, and the standard k-εtwo equation model and semi-implicit method for pressure linked equation (SIMPLE) were used to describe the flow turbulence. Furthermore, the structural dynamic equation was set up, which is solved by Newmark-β method. And several sort of wind-induced vibration coefficients such as the wind-induced vibration coefficient corresponding to the nodal displacement responses and wind loads were suggested. In the numerical simulation where the SGLV consisting of the cylindrical sectors with different curved surface was chosen as the example,the influence on the relative wind pressure distribution and structural wind-induced vibration responses of the closed or open SGLV caused by such parameters as the number of cylindrical sectors, structural curvature and the ratio of rise to span was investigated. Finally, some useful conclusions on the local wind pressure distribution on the structural surface and the wind-induced vibration coefficients of SGLV were developed.  相似文献   
176.
The smoothed particle hydrodynamics (SPH), as a fully Lagrangian particle method, has been successfully applied to astrophysical problems and extended to elastic dynamics and computational fluid dynamics.High order derivatives have to be approximated when elastic dynamics problems are modeled. However, the approximation errors in SPH could lead to computational failure in the case that the order of derivative is high.A novel method was proposed in order to improve the accuracy of SPH method, which shows the relationship between the selected functions and their SPH approximations. The entire involved system was represented by a finite number of particles that carry individual mass and occupy individual space, and the integral interpolation was approximated by a summation interpolation. In addition, error comparison was made between SPH method with and without the present improvement.  相似文献   
177.
Numerical modeling of ground response during diaphragm wall construction   总被引:2,自引:0,他引:2  
Construction of diaphragm wall panels may cause considerable stress changes in heavily overconsolidated soil deposits and can induce substantial ground movement. The 3D Lagrangian method was adopted to model the mechanical response of ground, including horizontal normal stress and shear stress, lateral ground displacement and vertical ground surface settlement, during the slurry trenching and concreting of diaphragm wall panels. Numerical results show that slurry trenching leads to horizontal stress relief of ground, reducing the horizontal stress of the ground from initial K0 pressure to hydrostatic betonite pressure. Wet concrete pressure lies between the hydrostatic bentonite pressure and the initial K0 pressure, so it can compensate partially the horizontal stress loss of the ground adjacent to the trench and thus reduce the lateral movement of the trench face as well as the vertical settlement of the ground surface.  相似文献   
178.
Image-guided computer aided surgery system (ICAS) contributes to safeness and success of surgery operations by means of displaying anatomical structures and showing correlative information to surgeons in the process of operation. Based on analysis of requirements for ICAS, a new concept of clinical knowledge-based ICAS was proposed. Designing a reasonable data structure model is essential for realizing this new concept. The traditional data structure is limited in expressing and reusing the clinical knowledge such as locating an anatomical object, topological relations of anatomical objects and correlative clinical attributes. A data structure model called mixed adjacency lists by octree-path-chain (MALOC) was outlined, which can combine patient's images with clinical knowledge, as well as efficiently locate the instrument and search the objects' information. The efficiency of data structures was analyzed and experimental results were given in comparison to other traditional data structures. The result of the nasal surgery experiment proves that MALOC is a proper model for clinical knowledge-based ICAS that has advantages in not only locating the operative instrument precisely but also proving surgeons with real-time operation-correlative information. It is shown that the clinical knowledge-based ICAS with MALOC model has advantages in terms of safety and success of surgical operations, and help in accurately locating the operative instrument and providing operation-correlative knowledge and information to surgeons in the process of operations.  相似文献   
179.
The parameter values which actually change with the circumstances, weather and load level etc.produce great effect to the result of state estimation. A new parameter estimation method based on data mining technology was proposed. The clustering method was used to classify the historical data in supervisory control and data acquisition (SCADA) database as several types. The data processing technology was impliedto treat the isolated point, missing data and yawp data in samples for classified groups. The measurement data which belong to each classification were introduced to the linear regression equation in order to gain the regression coefficient and actual parameters by the least square method. A practical system demonstrates the high correctness, reliability and strong practicability of the proposed method.  相似文献   
180.
Analysis and improvement of authenticatable ring signcryption scheme   总被引:1,自引:0,他引:1  
We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks.Furthermore, we propose an improved scheme that remedies the weakness of the Zhang-Yang-Zhu-Zhang scheme.The improved scheme has shorter ciphertext size than the Zhang-Yang-Zhu-Zhang scheme.We then prove that the improved scheme satisfies confidentiality, unforgeability, anonymity and authenticatability.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号