首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1854篇
  免费   0篇
公路运输   181篇
综合类   656篇
水路运输   653篇
综合运输   364篇
  2018年   334篇
  2017年   290篇
  2016年   247篇
  2015年   1篇
  2014年   2篇
  2013年   1篇
  2012年   55篇
  2011年   204篇
  2010年   212篇
  2009年   46篇
  2008年   176篇
  2007年   122篇
  2005年   50篇
  2004年   41篇
  2003年   55篇
  2002年   16篇
  2000年   1篇
  1989年   1篇
排序方式: 共有1854条查询结果,搜索用时 15 毫秒
131.
Protection against on-ship infectious disease—whether due to mishap or to harmful purpose—faces special situational problems. Sometimes, when infection levels on board have reached threshold levels, emergency actions are required. Often, the most thorough strategies for responding to threat are not feasible. A rapid first-stage test (RFT) is a fast, minimally invasive procedure used to rule out from possible infection a large percentage of an infection-threatened group. Prevention and control of on-ship infection need to combine various interconnected tactics. When timely criterion tests are not possible, the medical team must adopt fast alternative measures. The methods used to summarize protection against on-ship infectious agents included a scientific literature review and a web search. The fields of the review were maritime, health, and technology sources. Special attention was paid to material dealing with risks and threats of on-ship penetration by infectious agents, on-ship infection prevalence thresholds, and rapid diagnostic screens. The Bayes rule and the law of large numbers were applied to the analysis, for large on-ship populations, of RFT indications of crossing of an infection prevalence threshold. The increasing risk of serious on-ship infection—either accidental or purposeful—calls for a multi-layered protection approach. RFTs are a key part of the outer layer of such a defense. Well-designed and well-administered RFTs provide several advantages for defense against on-ship infection: low-cost, non-invasive, fast, and focuses on a drastically smaller number of infection possibilities.  相似文献   
132.
The brittleness analysis and important nodes detection have been a hot spot in the complex networks. How to get the overall feature of the whole network and how to find out some important nodes are requisites to solve these problems. In this paper, we adopt the trace of the adjacency matrix and the centrality of the complex networks to give a quantitative and qualitative analysis of networks being studied. Results show that the k-shell plays a more important role than the degree centrality and the betweenness in finding important nodes, and it can also be used to give direction on the immunization and maintenance of complex networks.  相似文献   
133.
A digital signature with message recovery is a signature that the message itself (or partial of the message) is not required to be transmitted together with the signature. It has the advantage of small data size of communication comparing with the traditional digital signatures. In this paper, combining both advantages of the message recovery signatures and the certificateless cryptography, we propose the first certificatelss signature scheme with message recovery. The remarkable feature of our scheme is that it can achieve Girault’s Level-3 security while the conventional certificateless signature scheme only achieves Level-2 security. The security of the scheme is rigorously proved in the random oracle model based on the hardness of the k bilinear Diffie-Hellman inverse (k-BDHI) problem.  相似文献   
134.
User selection is necessary for multiuser multiple-input multiple-output (MIMO) downlink systems with block diagonalization (BD) due to the limited free spatial transmit dimensions. The pure user selection algorithms can be improved by performing receive antenna selection (RAS) to increase sum rate. In this paper, a joint user and antenna selection algorithm, which performs user selection for sum rate maximization in the first stage and then performs antenna selection in the second stage, is proposed. The antenna selection process alternately drops one antenna with the poorest channel quality based on maximum determinant ranking (MDR) from the users selected during the first stage and activates one antenna with the maximum norm of projected channel from the remaining users. Simulation results show that the proposed algorithm significantly outperforms the algorithm only performing user selection as well as the algorithm combining user selection with MDR receive antenna selection in terms of sum rate.  相似文献   
135.
Of different model-based methods in vision based human tracking, many state of the art works focus on the stochastic optimization method to search in a very high dimensional space and try to find the optimal solution according to a proper likelihood function. Seldom works perform a framework of interactive multiple models (IMM) to track a human for challenging problems, such as uncertainty of motion styles, imprecise detection of feature points and ambiguity of joint location. This paper presents a two-layer filter framework based on IMM to track human motion. First, a method of model based points location is proposed to detect key feature points automatically and the filter in the first layer is performed to estimate the undetected points. Second, multiple models of motion are learned by the prior motion data with ridge regression and the IMM algorithm is used to estimate the quaternion vectors of joints rotation. Finally, experiments using real images sequences, simulation videos and 3D voxel data demonstrate that this human tracking framework is efficient.  相似文献   
136.
The aim of this study was to assess proof of concept and usability of a maritime service website prototype in a full-mission ship bridge simulator through Swedish mariners’ experiences and perceptions. This test was part of the European Commission’s EfficienSea2 project for e-navigation. The prototype was intended as an aid to existing standard systems and methodologies for planning, executing and monitoring voyages. The study began with 5 days of simulator trials focused on today’s standard practices. This served as a baseline to compare to subsequent 4 days of simulator trials testing the prototype. For data collection, observations, video footage, interviews, and eye tracking were used. Data analysis included breaking apart the qualitative data to capture the perceptions of the participants, and a preliminary analysis of eye-tracking data as a complement. The results suggested that the prototype could be more suitable for a route planning stage, that the participants were familiar with similar existing solutions from other manufacturers, and that the contents of the tool would be most beneficial if integrated within the Electronic Chart Display and Information Systems (ECDIS). There is a pressing need for the novel solutions to be user needs-driven, integrated with the existing technologies, and standardized across the domain, and these processes must go hand-in-hand with accounting for all involved stakeholders, procedures, regulations, and training, as this will alter the course of shipping.  相似文献   
137.
Radar target signals and chaff cloud jamming signals have different characters by the wavelet transform. The wavelet coefficients of radar target signals are highly correlated with its near-and-near-scale wavelet coefficients, however the correlativity between the wavelet coefficients of chaff cloud jamming signals and its near-and-near scale wavelet coefficients is less significant. Based on the binary-base discrete wavelet transform and the correlation algorithm, the method of target entropy to estimate standard variance of the jamming signals and each scale is proposed to ensure reasonable threshold, to suppress chaff cloud signals and finally to reconstruct mixed signals by the improved spatially selective noise filtration (ISSNF) method. The extensive simulation results show that the proposed method can availably suppress chaff cloud jamming and decontaminate target echo.  相似文献   
138.
This article discusses the enforcement of shipping standards, with a particular focus on Part XII of UNCLOS. Section 6 of Part XII contains the only comprehensive set of vessel-related enforcement provisions in the Convention, but the Part’s scope is limited to “the preservation and protection of the marine environment.” Therefore, not all shipping standards fall clearly within Part XII’s ambit, including those centered on safety, security, and crewing considerations. The enforcement provisions of Section 6 are favorable to flag states and their vessels, and Section 7 contains a number of safeguards for their benefit, so it is in the interests of these parties to have coastal state enforcement governed by Part XII. However, the ability of coastal states to establish and enforce shipping standards that apply within the territorial sea extends to more than just environmental matters. The result is that different standards give rise to different enforcement powers, depending on the maritime zone in which a vessel is located, even if those standards arise from the same international agreement. It is suggested that to remedy these problems, UNCLOS would need to be amended in order to provide a comprehensive enforcement regime for the enforcement of shipping standards.  相似文献   
139.
A novel method toward color image segmentation is proposed based on edge linking and region grouping. Firstly, the edges extracted by the Canny detector are linked to form regions. Each of the end points of edges is connected by a direct line to the nearest pixel on another edge segment within a sub-window. A new distance is defined based on the feature that the edge tends to preserve its original direction. By sampling the lines to the image, the image is over-segmented to labeled regions. Secondly, the labeled regions are grouped both locally and globally. A decision tree is constructed to decide the importance of properties that affect the merging procedure. Finally, the result is refined by user’s selection of regions that compose the desired object. Experiments show that the method can effectively segment the object and is much faster than the state-of-the-art color image segmentation methods.  相似文献   
140.
Democratic group signature (DGS) is a group-oriented primitive with great flexibilities, i.e., no group manager, anonymity, and traceability. In a DGS scheme with (t, n)-threshold traceability, any subset of not less than t members can jointly reveal the identity of the signer while preserving security even in the presence of an active adversary can corrupt up to t − 1 group members. This paper proposes an efficient DGS scheme. We use publicly verifiable secret sharing (PVSS) to distribute the trapdoor via which the real signer is revealed. The computation cost and communication overhead of our DGS signatures are greatly reduced, compared with the existing work. For example, the size of the resulting signature contains only 2n + 1 elements of Z q , except the PVSS output.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号