全文获取类型
收费全文 | 4581篇 |
免费 | 148篇 |
专业分类
公路运输 | 976篇 |
综合类 | 1397篇 |
水路运输 | 1378篇 |
铁路运输 | 522篇 |
综合运输 | 456篇 |
出版年
2024年 | 4篇 |
2023年 | 23篇 |
2022年 | 74篇 |
2021年 | 92篇 |
2020年 | 88篇 |
2019年 | 44篇 |
2018年 | 371篇 |
2017年 | 328篇 |
2016年 | 292篇 |
2015年 | 88篇 |
2014年 | 121篇 |
2013年 | 169篇 |
2012年 | 247篇 |
2011年 | 388篇 |
2010年 | 425篇 |
2009年 | 235篇 |
2008年 | 380篇 |
2007年 | 352篇 |
2006年 | 244篇 |
2005年 | 223篇 |
2004年 | 111篇 |
2003年 | 119篇 |
2002年 | 77篇 |
2001年 | 54篇 |
2000年 | 49篇 |
1999年 | 24篇 |
1998年 | 25篇 |
1997年 | 18篇 |
1996年 | 15篇 |
1995年 | 15篇 |
1994年 | 6篇 |
1993年 | 6篇 |
1992年 | 8篇 |
1991年 | 3篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1986年 | 1篇 |
1985年 | 2篇 |
排序方式: 共有4729条查询结果,搜索用时 15 毫秒
991.
铁路板式轨道结构平面有限元分析 总被引:2,自引:0,他引:2
无碴轨道是一种新型的轨道结构型式,越来越多地应用于高速铁路。目前,无碴轨道结构计算理论还不完善,多采用叠合梁的方法。现采用平面有限元方法,把荷载和轨道结构看成一个系统,对板式无碴轨道在荷载作用下的竖向位移和内力进行了分析,并通过MATLAB编程实现,计算结果符合无碴轨道结构基本原理。 相似文献
992.
碰撞检测中计算两凸多面体间最短距离的算法研究 总被引:2,自引:0,他引:2
提出了一种计算两凸多面体问最短距离的算法.该算法用物体三维空间顶点坐标的凸包表示凸多面体,采用非线性规划方法来计算两凸多面体同最短距离,并通过最短距离来判断两凸多面体是否发生碰撞.实例证明这种方法的有效性. 相似文献
993.
重型发动机欧Ⅲ排放测试主控计算机系统开发 总被引:2,自引:1,他引:2
为满足重型发动机欧Ⅲ排放法规认证试验和研究开发试验的要求,开发了台架排放测试主控计算机系统.基于IPC和现场总线数据采集模块设计了系统硬件,采用虚拟仪器开发平台Lab-VIEW开发了系统软件.主控计算机系统能够集成测功机、分析仪、颗粒采样系统等设备,实现重型发动机ESC,ETC和ELR试验的数据采集,流程控制和数据处理,现场试验表明系统具有可靠性好,功能全面和便于扩展的特点。 相似文献
994.
Si Lüsheng 《西安交通大学学报(英文版)》2006,18(1):44-48,77
Objective To construct eukaryutic expression vector of HPV18 L1- E6, E7 chimeric gene and examine the humorul and cellular immune responses induced by this DNA vaccines in mice. Methods The C-terminal of major rapsid protein L1 gene and mutant zinc finger domains of early E6/7 oncogenes in HPV18 were integrated and inserted into eukaryotic expression vector pVAX1 to generate vaccines pVAX1-L1E6Mxx, ETMxx. CHO cells were transiently transfected with the individual construct. Target protein expressions in the lysate of the transfected cells were measured by ELISA and immunocytochemistry After BALB/c mice were vaccinated with various recombinant plusmids(pVAX1- L1-E6M3 or pVAX1-L1-E7M3 ) and immunie adjuvants (pLXHDmB7-2 or LTB) through different administration routes (intramuscular or intranasal) , the great cellular immune responses were produced us revealed by delayed-type hypersensitivity (DTH) and lymphocyte proliferation, and the expression of IL-4 and IFN- 7 cells in CD4^+ and CD8^+ subpopulations. Results The highly efficient expression of pVAX1-L1E6Mxx, E7Mxx vector in host eukaryotic cells were demonstrated both by ELISA and immunocytochemistry. The level of specific serum IgG against HPV in experiment groups mice was much higher than that of control group, and intranuscular immunization group had the highest antibody level. Intramuscular immunization groups were superior to intranasal immunization groups in DTH response, splenocyte proliferation and CD8^+ IFN-γ^+ cells number, but CD4^+ IL4^+ cell number was higher in intranasul immunization groups. The immunization groups using pLXHDmB7.-2 as adjuvant were superior to other groups in immunorespouse. Conclusion These DNA vaccines produce remarkable cellular and humorul immune responses in the mouse and may provide us prophylatic and therapeutic candidates for HPV induced cancer treatment. 相似文献
995.
996.
997.
本文结合阜朝高速公路张福店Ⅱ号高架桥施工实践,介绍了该桥采用SDLB型双导梁架桥机架设30米T梁的施工技术和施工要点。 相似文献
998.
Linux has a special feature of automount in the Linux kernel. Filesystem can be mounted and unmounted automatically. Its performance is similar to MS Windows. It works well under demands of more saving resources and automatization, like memory of system. An approach to install/update software automatically on embedded platform was proposed. This approach derives from above feature based on embedded environment with Linux OS. Configurations of files related to this feature were introduced. An example in practice was given to realize this approach from universal serial bus (USB) memory disk when USB disk is available. 相似文献
999.
Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworthiness that is based on the knowledge related to the peer's identity, while identity privacy is usually achieved by hiding such knowledge. A trust model based on trusted computing (TC) technology was proposed to enhance the identity privacy of peers during the trustworthiness evaluation process between peers from different groups. The simulation results show that, the model can be implemented in an efficient way, and when the degree of anonymity within group (DAWG) is up to 0.6 and the percentage of malicious peers is up to 70%7 the service selection failure rate is less than 0.15. 相似文献
1000.
Applications on iterative control and multiple input multiple output (MIMO) system were developed. Two new charts derived from extrinsic information transfer (EXIT) chart were employed as the designing tools, which are called as output mutual information chart with defined iterative degree (DID) chart and near optimum output mutual information (NOMI) chart respectively. Different from the EXIT chart, they can show the iterative performance on the whole signal-to-noise ratio range with one single curve, whereas computation complexity is greatly reduced compared with conventional bit error ratio (BER) performance curve. The iterative control was implemented according to a near-optimum iterative degree vector determined by NOMI chart, the reasonability of uncertain parameters was analyzed in one MIMO system. The concepts were illustrated based on bit-interleaved coded modulation with iterative decoding (BICM-ID). 相似文献