全文获取类型
收费全文 | 5074篇 |
免费 | 86篇 |
专业分类
公路运输 | 1127篇 |
综合类 | 1436篇 |
水路运输 | 1604篇 |
铁路运输 | 535篇 |
综合运输 | 458篇 |
出版年
2024年 | 3篇 |
2023年 | 14篇 |
2022年 | 60篇 |
2021年 | 106篇 |
2020年 | 76篇 |
2019年 | 31篇 |
2018年 | 357篇 |
2017年 | 322篇 |
2016年 | 292篇 |
2015年 | 87篇 |
2014年 | 99篇 |
2013年 | 186篇 |
2012年 | 261篇 |
2011年 | 465篇 |
2010年 | 469篇 |
2009年 | 291篇 |
2008年 | 461篇 |
2007年 | 464篇 |
2006年 | 314篇 |
2005年 | 256篇 |
2004年 | 95篇 |
2003年 | 107篇 |
2002年 | 58篇 |
2001年 | 70篇 |
2000年 | 58篇 |
1999年 | 20篇 |
1998年 | 26篇 |
1997年 | 15篇 |
1996年 | 23篇 |
1995年 | 18篇 |
1994年 | 15篇 |
1993年 | 6篇 |
1992年 | 11篇 |
1991年 | 10篇 |
1990年 | 5篇 |
1989年 | 2篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1984年 | 2篇 |
排序方式: 共有5160条查询结果,搜索用时 15 毫秒
121.
A cybernetics model of manufacturing execution system(MES CM) was proposed and studied from the viewpoint of cybernetics.Combining with the features of manufacturing system, the MES CM was modeled by"generalized modeling"method that is discussed in large-scale system theory.The mathematical model of MES CM was constructed by the generalized operator model, and the main characteristics of MES CM were analyzed. 相似文献
122.
123.
李发根 《上海交通大学学报(英文版)》2008,13(6):679-683
We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks.Furthermore, we propose an improved scheme that remedies the weakness of the Zhang-Yang-Zhu-Zhang scheme.The improved scheme has shorter ciphertext size than the Zhang-Yang-Zhu-Zhang scheme.We then prove that the improved scheme satisfies confidentiality, unforgeability, anonymity and authenticatability. 相似文献
124.
This paper describes two identity-based broadcast encryption(IBBE) schemes for mobile ad hoc networks.The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)-size ciphertexts.Furthermore, when the public keys are transmitted, the two schemes have short transmissions and achieve O(1) user storage cost, which are important for a mobile ad hoc network.Finally, the proposed schemes are provable security under the decision generalized bilinear Di?-Hellman(GBDH) assumption in the random oracles model. 相似文献
125.
The parameter values which actually change with the circumstances, weather and load level etc.produce great effect to the result of state estimation. A new parameter estimation method based on data mining technology was proposed. The clustering method was used to classify the historical data in supervisory control and data acquisition (SCADA) database as several types. The data processing technology was impliedto treat the isolated point, missing data and yawp data in samples for classified groups. The measurement data which belong to each classification were introduced to the linear regression equation in order to gain the regression coefficient and actual parameters by the least square method. A practical system demonstrates the high correctness, reliability and strong practicability of the proposed method. 相似文献
126.
为解决散热器面罩开裂问题,提出了焊点优化方案和散热器面罩加强板外置/加强板内置方案,并进行了模块化设计,制定了2组改进措施。有限元分析结果表明:2种改进措施与原状态相比,均有良好应力改善效果,满足应力要求。 相似文献
127.
128.
129.
Although the upwind configuration is more popular in the field of wind energy, the downwind one is a promising type for the offshore wind energy due to its special advantages. Different configurations ... 相似文献
130.
本文分析了冷藏集装箱的现状并在冷藏集装箱监测系统需求分析的基础上,针对目前冷藏集装箱监控系统的缺点,提出了未来冷藏集装箱监测系统的发展趋势。 相似文献