首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4484篇
  免费   25篇
公路运输   1135篇
综合类   751篇
水路运输   1416篇
铁路运输   91篇
综合运输   1116篇
  2023年   23篇
  2022年   59篇
  2021年   24篇
  2020年   17篇
  2019年   24篇
  2018年   405篇
  2017年   344篇
  2016年   349篇
  2015年   35篇
  2014年   120篇
  2013年   395篇
  2012年   193篇
  2011年   335篇
  2010年   332篇
  2009年   174篇
  2008年   298篇
  2007年   177篇
  2006年   55篇
  2005年   112篇
  2004年   84篇
  2003年   100篇
  2002年   55篇
  2001年   40篇
  2000年   49篇
  1999年   34篇
  1998年   34篇
  1997年   45篇
  1996年   42篇
  1995年   57篇
  1994年   28篇
  1993年   31篇
  1992年   19篇
  1991年   18篇
  1990年   16篇
  1989年   15篇
  1988年   19篇
  1987年   20篇
  1986年   18篇
  1985年   26篇
  1984年   25篇
  1983年   25篇
  1982年   26篇
  1981年   37篇
  1980年   25篇
  1979年   39篇
  1978年   14篇
  1977年   27篇
  1976年   18篇
  1975年   23篇
  1974年   13篇
排序方式: 共有4509条查询结果,搜索用时 250 毫秒
451.
Distributed information systems require complex access control which depends upon attributes of protected data and access policies. Traditionally, to enforce the access control, a file server is used to store all data and act as a reference to check the user. Apparently, the drawback of this system is that the security is based on the file server and the data are stored in plaintext. Attribute-based encryption (ABE) is introduced first by Sahai and Waters and can enable an access control mechanism over encrypted data by specifying the users’ attributes. According to this mechanism, even though the file server is compromised, we can still keep the security of the data. Besides the access control, user may be deprived of the ability in some situation, for example paying TV. More previous ABE constructions are proven secure in the selective model of security that attacker must announce the target he intends to attack before seeing the public parameters. And few of previous ABE constructions realize revocation of the users’ key. This paper presents an ABE scheme that supports revocation and has full security in adaptive model. We adapt the dual system encryption technique recently introduced by Waters to ABE to realize full security.  相似文献   
452.
This paper presents a detailed diagnostic analysis of hydrographic and current meter data from three, rapidly repeated, fine-scale surveys of the Almeria–Oran front. Instability of the frontal boundary, between surface waters of Atlantic and Mediterranean origin, is shown to provide a mechanism for significant heat transfer from the surface layers to the deep ocean in winter. The data were collected during the second observational phase of the EU funded OMEGA project on RRS Discovery cruise 224 during December 1996. High resolution hydrographic measurements using the towed undulating CTD vehicle, SeaSoar, traced the subduction of Mediterranean Surface Water across the Almeria–Oran front. This subduction is shown to result from a significant baroclinic component to the instability of the frontal jet. The Q-vector formulation of the omega equation is combined with a scale analysis to quantitatively diagnose vertical transport resulting from mesoscale ageostrophic circulation. The analyses are presented and discussed in the presence of satellite and airborne remotely sensed data; which provide the basis for a thorough and novel approach to the determination of observational error.  相似文献   
453.
Aiming at the problem that the fast tracking algorithm using spatio-temporal context (STC) will inevitably lead to drift and even lose the target in long-term tracking, a new algorithm based on spatio-temporal context that integrates long-term tracking with detecting is proposed in this paper. We track the target by the fast tracking algorithm, and the cascaded search strategy is introduced to the detecting part to relocate the target if the fast tracking fails. To a large extent, the proposed algorithm effectively improves the accuracy and stability of long-term tracking. Extensive experimental results on benchmark datasets show that the proposed algorithm can accurately track and relocate the target though the target is partially or completely occluded or reappears after being out of the scene.  相似文献   
454.
Abstract

The passage of the Marine Plastics Pollution Research and Control Act of 1987 (MPPRCA), which codified Annex V of the International Convention for the Prevention of Pollution from Ships (MARPOL), has encompassed every commercial and recreational shipping and boating facility in the United States. As a group, these ports, harbors, and marinas form a significant, although proportionately small, portion of the coastline of the country. More important, the economic benefits derived from the complex shoreside infrastructures required for international ocean trade, commercial and recreational fishing, and pleasure boating indicate just how critical it is for these facilities to be in conformance with effective and prudent coastal zone and environmental management practices.  相似文献   
455.
Plates form one of the basic elements of structures. Land-based structures may be subjected to air blast loads during combat environment or terrorist attack, while marine structures may be subjected to either air blast by the attack of a missile above the water surface or an underwater explosion by the attack of a torpedo or a mine or a depth charge and an aircraft structure may be subjected to an in-flight attack by on-board explosive devices. Furthermore, gas explosion occurs in offshore installations and industries. This review focuses on the phenomenological evolution of blast damage of plates.  相似文献   
456.
Circuit net list bipartitioning using simulated annealing technique has been proposed in the paper. The method converges asymptotically and probabilistically to global optimization. The circuit net list is partitioned into two partitions such that the number of interconnections between the partitions is minimized. The proposed method begins with an innovative clustering technique to obtain a good initial solution. Results obtained show the versatility of the proposed method in solving non polynomial hard problems of circuit net list partitioning and show an improvement over those available in literature.  相似文献   
457.
In a coil box between the roughing and finishing stands on a hot strip mill, a problem has been encountered that the entry region of the plate touches the bending rolls and deforms. As a result, the defective coil occurs. The condition of plate bending, which forms a new deformation feature in coiling, is analyzed. In this paper, the authors focus on the research of the effects of coiling parameters, such as the thickness of plate, roll speed and feeding speed of plate in coil box, and on specific plate bending. A finite element method is developed to simulate this coiling process. Based on numerical simulation, the effects of the coiling parameters on the mechanics and deformation of the bending plate are obtained. Numerical simulation tests have verified the validity of the developed model.  相似文献   
458.
459.
A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the range of a specified reader so that an off-line verifier can verify the proofs later. This proof has found several interesting applications. However, many existing RFID yoking schemes are vulnerable to replay attacks. To overcome the weaknesses, Cho et al. proposed a new RFID yoking proof protocol and a new grouping protocol. Unfortunately, Cho et al.’s schemes are still vulnerable to replay attacks. In this paper, in addition to demonstrating weaknesses, we further discuss the rationale behind these weaknesses to provide a guide line for designing secure RFID yoking schemes. Based on the guide line, we propose a new RFID yoking scheme and a new RFID grouping scheme. Performance evaluation shows that our scheme outperforms its counterparts.  相似文献   
460.
This paper reports upon a survey of traffic noise annoyance in three residential districts of Trinidad, West Indies. Householder perceptions were solicited by means of a questionnaire survey and direct measurements of traffic noise levels were taken. The results were compared with surveys elsewhere. It was concluded that household status had little effect on annoyance perception, that at L10 levels greater than 70 dB(A) at a dwelling facade the noise level is unacceptable. L10 levels less than 65 dB(A) at the building facade are not perceived as annoying in the environment considered.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号