全文获取类型
收费全文 | 1579篇 |
免费 | 26篇 |
专业分类
公路运输 | 451篇 |
综合类 | 418篇 |
水路运输 | 391篇 |
铁路运输 | 304篇 |
综合运输 | 41篇 |
出版年
2023年 | 2篇 |
2022年 | 31篇 |
2021年 | 47篇 |
2020年 | 33篇 |
2019年 | 11篇 |
2018年 | 16篇 |
2017年 | 14篇 |
2016年 | 24篇 |
2015年 | 35篇 |
2014年 | 70篇 |
2013年 | 78篇 |
2012年 | 92篇 |
2011年 | 115篇 |
2010年 | 91篇 |
2009年 | 120篇 |
2008年 | 109篇 |
2007年 | 181篇 |
2006年 | 185篇 |
2005年 | 129篇 |
2004年 | 35篇 |
2003年 | 22篇 |
2002年 | 17篇 |
2001年 | 29篇 |
2000年 | 34篇 |
1999年 | 25篇 |
1998年 | 12篇 |
1997年 | 8篇 |
1996年 | 6篇 |
1995年 | 5篇 |
1994年 | 4篇 |
1993年 | 6篇 |
1992年 | 2篇 |
1991年 | 4篇 |
1990年 | 5篇 |
1989年 | 3篇 |
1988年 | 4篇 |
1987年 | 1篇 |
排序方式: 共有1605条查询结果,搜索用时 78 毫秒
101.
In the connected vehicles, connecting interfaces bring threats to the vehicles and they can be hacked to impact the vehicles and drivers. Compared with traditional vehicles, connected vehicles require more information transfer. Sensor signals and critical data must be protected to ensure the cyber security of connected vehicles. The communications among ECUs, sensors, and gateways are connected by in-vehicle networks. This paper discussed the state-of-art techniques about secure communication for in-vehicle networks. First, the related concepts in automotive secure communication have been provided. Then we have compared and contrasted existing approaches for secure communication. We have analyzed the advantages/disadvantages of MAC and digital signatures for message authentication and compared the performance and limitations of different cryptographic algorithms. Firewall and intrusion detection system are introduced to protect the networks. The constraints and features of different intrusion detection approaches are presented. After that, the technical requirements for cryptographic mechanism and intrusion detection policy are concluded. Based on the review of current researches, the future development directions of the automotive network security have been discussed. The purpose of this paper is to review current techniques on automotive secure communication and suggest suitable secure approaches to implement on the in-vehicle networks. 相似文献
102.
103.
In order to assess colonic motility of chronic constipation, colonic transit test was carried out in 34 patients with chronic constipation and in 20 healthy subjects. 20 radiopaque markers are ingested at 8 am before the day test, and plain abdominal films were obtained at 24 h, 48 h and 72 h. The normal value of colonic transit test was 16(80%), or more markers passed after 72 h. By means of transit time study, 34 constipated patients were classified into 2 groups: 12 normal transit patients and 22 slow transit patients. There was no difference in colonic transit time between normal transit patients and controls (P>0.05). Patients with slow transit had more markers left in right colon, left colon and rectosigmoid colon at 48 h (P<0.01, respectively) and 72 h (P<0.01, respectively). According to the transit index, 22 slow transit patients were divided into 3 types: 10 cases colonic stasis, 8 cases outlet obstruction and 4 cases colorectal stasis. The study suggests that chronic constipated patients have abnormalbilities of colonic transit. 相似文献
104.
105.
针对水运企业的特点,提出水运企业筹资风险的简易度量方法,并对筹资如何有利于优化水运企业资本结构进行探讨。 相似文献
106.
A game-theoretic analysis of competition among container port hubs: the case of Busan and Shanghai 1
Christopher M. Anderson Yong-An Park Young-Tae Chang Chang-Ho Yang Tae-Woo Lee Meifeng Luo 《Maritime Policy and Management》2008,35(1):5-26
Countries throughout the world, and especially within Asia, are investing heavily in container port infrastructure in the hopes of capturing a larger share of global shipping activity for their economies. Many existing ports are emphasizing developing the capacity to serve as a hub port, building deepwater berths with large terminals to facilitate transfer of containers from feeder ships to mother ships for intercontinental transport. We develop a game-theoretic best response framework for understanding how competitor ports will respond to development at a focus port, and whether the focus port will be able to capture or defend market share by building additional capacity. We apply this model to investment and competition currently occurring between the ports of Busan and Shanghai. 相似文献
107.
在分析讨论移动与固定设备之间的差异性、移动式设备种类等问题的基础上,初步提出以图片为证据存储模式的移动式非现场执法的处理流程及方法,为相关工作提供参考。 相似文献
108.
109.
介绍了《数控回转头冲床自动编程系统》的功能和设计特点。它利用中Windows95作为系统工作平台,直接利用产品设计时零件在计算机内的图形信息,采用人机交互方式进行数控编程,此系统适用于数控回转头冲床的自动编程,它是板金计算机辅助设计与制造(CAD/CAM)开发的关键。 相似文献
110.
锦屏二级水电站引水隧洞工程埋深大,地应力高,在采用TBM法施工中碰到了高地应力导致的岩爆问题,对施工进度、设备和人员安全影响较大。总结TBM施工过程中岩爆发生规律,通过各种支护形式的现场试验,对防止岩爆的主要对策进行了探索。 相似文献