全文获取类型
收费全文 | 2432篇 |
免费 | 12篇 |
专业分类
公路运输 | 351篇 |
综合类 | 798篇 |
水路运输 | 823篇 |
铁路运输 | 86篇 |
综合运输 | 386篇 |
出版年
2022年 | 9篇 |
2021年 | 10篇 |
2020年 | 21篇 |
2019年 | 6篇 |
2018年 | 339篇 |
2017年 | 297篇 |
2016年 | 256篇 |
2015年 | 18篇 |
2014年 | 18篇 |
2013年 | 46篇 |
2012年 | 85篇 |
2011年 | 240篇 |
2010年 | 254篇 |
2009年 | 80篇 |
2008年 | 222篇 |
2007年 | 181篇 |
2006年 | 50篇 |
2005年 | 94篇 |
2004年 | 49篇 |
2003年 | 69篇 |
2002年 | 28篇 |
2001年 | 18篇 |
2000年 | 9篇 |
1999年 | 8篇 |
1998年 | 4篇 |
1997年 | 6篇 |
1996年 | 10篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1993年 | 2篇 |
1992年 | 6篇 |
1991年 | 3篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 2篇 |
排序方式: 共有2444条查询结果,搜索用时 171 毫秒
221.
To explore the possible mechanism of osteogenesis for deciduous teeth stem cells (DTSCs) in vivo/ vitro, stem cells from goat
deciduous teeth (SGDs) were firstly isolated, induced and transplanted into immunocompromised mice. The SGDs’s mineralization
pattern and osteogenesis were compared with bone marrow messenchymal stem cells (BMMSCs) from goats. SGDs have similar osteogenic
differentiation pattern in vitro and bone-like tissue formation mechanism in vivo to BMMSCs; moreover SGDs have stronger alkaline
phosphatase (ALP) gene expression and osteopontin (OPN) gene expression levels than BMMSCs; also SGDs can form more bone-like
tissues than BMMSCs when cell-scaffold compounds are transplanted into immunocompromised mice. This pre-clinical study in
a large-animal model confirms that DTSCs may be an appropriate source of stem cells in repairing bone defects with tissue
engineering. 相似文献
222.
Plasma sprayed coatings are built up by the accumulation of splats formed by the impacting, spreading and solidifying of molten
droplets on the substrate. A three-dimensional computational model including heat transfer and solidification is established
to simulate the formation process of a single splat using the computational fluid dynamics (CFD) software, FLUENT. The fluid
flow and energy equations are discretized and solved according to typical finite volume method on an unstructured grid. A
volume of fluid (VOF) tracking algorithm is used to track the droplet flow with free surface. In order to understand the splat
formation mechanism, the process of splat formation caused by impacting and spreading of a molten nickel droplet on a polished
mild steel surface is simulated. On this basis, the simulations of impact of a molten droplet on substrate with different
conditions including the surface morphology, thermal conductivity, initial temperature of the substrate and the thermal contact
resistance are presented. The results clearly show the effect of those parameters on the shape of the final splat and splash
behaviors. 相似文献
223.
An optimization scheme for choosing the optimum number of secondary users in cooperative spectrum sensing based on the cyclostationary
feature detection with Neyman-Pearson criterion is proposed in this paper. The optimal soft combination test statistic for
the cooperative spectrum sensing based on cyclostationary feature detection is derived according to the generalized likelihood
ratio test and its corresponding detection performance is deduced. A target function, considering two important parameters
as the resource use efficiency and the number of samples employed by each cooperative secondary user in the system design,
is constructed to obtain the optimum number of cooperative secondary users. It can be found that the selection scheme is to
make a tradeoff between the system complexity of the cognitive radio network and the global sensing performance of the cooperative
spectrum sensing. 相似文献
224.
For the task of visual-based automatic product image classification for e-commerce, this paper constructs a set of support
vector machine (SVM) classifiers with different model representations. Each base SVM classifier is trained with either different
types of features or different spatial levels. The probability outputs of these SVM classifiers are concatenated into feature
vectors for training another SVM classifier with a Gaussian radial basis function (RBF) kernel. This scheme achieves state-of-the-art
average accuracy of 86.9% for product image classification on the public product dataset PI 100. 相似文献
225.
金云 《上海交通大学学报(英文版)》2011,16(5):533-537
External equality and absolute equality are defined model independently by Fu. It is interesting and important to know whether
these two equalities coincide or not. There are some results in Fu’s paper for this issue. It is relatively easy to prove
the coincidence if the summation operator is in the language, otherwise it is harder. In fact Fu proposed it as an open problem
whether the two equalities coincide in some languages without summation. In this paper, the proofs of the coincidence in finite
CCS and π calculus without summation are given. 相似文献
226.
Collaborative spectrum sensing is proposed to improve the detection performance in cognitive radio (CR) networks. However,
most of the current collaborative sensing schemes are vulnerable to the interference of the malicious secondary users (SUs).
In this paper we propose a reputation-based collaborative spectrum sensing scheme to improve the security of cooperative sensing
by mitigating the impacts of misbehaviors. The fusion center calculates the reputation rating of each SU according to their
history reports to weight their sensing results in the proposed scheme. We analyze and evaluate the performance of the proposed
scheme and its advantages over previous schemes in expansibility and integrity. Simulation results show that the proposed
scheme can minimize the harmful influence from malicious SUs. 相似文献
227.
Based on the analysis of heat transfer mechanics, physical and chemical change of pellet drying and preheating process in
grate, the mathematical model is established and solved by three-diagonal matrix algorithm. With Visual Basic 6.0 a simulation
software is developed. The model is verified by measurements at a domestic pellet plant, and the temperature distribution
of pellet bed is gained. Meanwhile, the influence of different operation parameters on the pellet thermal process is studied.
The results can be taken as a basis of practical production control and the grate optimizing design. 相似文献
228.
远洋教学实习船是在大连海事大学提出建成“世界一流高等航海学府”的目标基础上建成的,专供航海学员航行实习的船舶。结合远洋教学实习船的详细设计,搭建“数字船舶”的测试平台。简要介绍了为其配备的先进船舶科研设备的功能和应用。该船为今后数字化信息化航海技术工作者的学习与探索提供了经验及资料数据。 相似文献
229.
TANGLi-qiang ZHENGGui CAIYan-hong 《船舶与海洋工程学报》2004,3(2):73-78
A mechanical model of visco-elastic material is established in order to investigate viscous effect in dynamic growing crack-tip field of mode Ⅱ. It is shown that in stable creep growing phase, elastic deformation and viscous deformation are equally dominant in the near-tip field, the stress and strain have the same singularity, namely, (σε) ∝r^-1/(n-1). The asymptotic solutions of separatied variables of stress, stain and displacement in crack-tip field are obtained by asymptotic analysis, and the results of numerical value of stress and strain in crack-tip field are obtained by shooting method. Through numerical calculation, it is shown that the near-tip fields are mainly governed by the creep exponent n and Mach number M. By the asymptotic analysis to the crack-tip field, the fracture criterion of mode Ⅱ dynamic growing crack of visco-elastic materials is put forward from the point of view of strain. 相似文献
230.
Distributed information systems require complex access control which depends upon attributes of protected data and access
policies. Traditionally, to enforce the access control, a file server is used to store all data and act as a reference to
check the user. Apparently, the drawback of this system is that the security is based on the file server and the data are
stored in plaintext. Attribute-based encryption (ABE) is introduced first by Sahai and Waters and can enable an access control
mechanism over encrypted data by specifying the users’ attributes. According to this mechanism, even though the file server
is compromised, we can still keep the security of the data. Besides the access control, user may be deprived of the ability
in some situation, for example paying TV. More previous ABE constructions are proven secure in the selective model of security
that attacker must announce the target he intends to attack before seeing the public parameters. And few of previous ABE constructions
realize revocation of the users’ key. This paper presents an ABE scheme that supports revocation and has full security in
adaptive model. We adapt the dual system encryption technique recently introduced by Waters to ABE to realize full security. 相似文献