首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2306篇
  免费   8篇
公路运输   451篇
综合类   674篇
水路运输   740篇
铁路运输   9篇
综合运输   440篇
  2022年   2篇
  2021年   7篇
  2020年   10篇
  2019年   2篇
  2018年   347篇
  2017年   300篇
  2016年   276篇
  2015年   12篇
  2014年   36篇
  2013年   61篇
  2012年   95篇
  2011年   246篇
  2010年   258篇
  2009年   93篇
  2008年   217篇
  2007年   130篇
  2006年   13篇
  2005年   58篇
  2004年   43篇
  2003年   60篇
  2002年   21篇
  2001年   4篇
  2000年   5篇
  1999年   1篇
  1998年   1篇
  1997年   2篇
  1996年   3篇
  1995年   4篇
  1994年   1篇
  1992年   1篇
  1990年   1篇
  1987年   1篇
  1983年   1篇
  1979年   1篇
  1977年   1篇
排序方式: 共有2314条查询结果,搜索用时 31 毫秒
81.
Of different model-based methods in vision based human tracking, many state of the art works focus on the stochastic optimization method to search in a very high dimensional space and try to find the optimal solution according to a proper likelihood function. Seldom works perform a framework of interactive multiple models (IMM) to track a human for challenging problems, such as uncertainty of motion styles, imprecise detection of feature points and ambiguity of joint location. This paper presents a two-layer filter framework based on IMM to track human motion. First, a method of model based points location is proposed to detect key feature points automatically and the filter in the first layer is performed to estimate the undetected points. Second, multiple models of motion are learned by the prior motion data with ridge regression and the IMM algorithm is used to estimate the quaternion vectors of joints rotation. Finally, experiments using real images sequences, simulation videos and 3D voxel data demonstrate that this human tracking framework is efficient.  相似文献   
82.
We consider the problem of characterizing user equilibria and optimal solutions for routing in a given network. We extend the known models by considering users oblivious to congestion in the following sense: While in the typical user equilibrium setting the users follow a strategy that minimizes their individual cost by taking into account the (dynamic) congestion due to the current routing pattern, an oblivious user ignores congestion altogether; instead, he or she decides his routing on the basis of cheapest routes on a network without any flow whatsoever. These cheapest routes can be, for example, the shortest paths in the network without any flow. This model tries to capture the fact that a certain percentage of travelers base their route simply on the distances they observe on a map, without thinking (or knowing, or caring) about the delays experienced on this route due to their fellow travelers. In this work we study the effect of such users using as the measure of network performance its price of anarchy, i.e., the ratio of the total latency experienced by the users (oblivious or not) at equilibrium over the social optimum.  相似文献   
83.
This research seeks to improve the understanding of the full range of determinants for mode choice behavior and to offer practical solutions to practitioners on representing and distinguishing these characteristics in travel demand forecasting models. The principal findings were that the representation of awareness of transit services is significantly different than the underlying assumption of mode choice and forecasting models that there is perfect awareness and consideration of all modes. Furthermore, inclusion of non-traditional transit attributes and attitudes can improve mode choice models and reduce bias constants. Additional methods and analyses are necessary to bring these results into practice. The work is being conducted in two phases. This paper documents the results of Phase I, which included data collection for one case study city (Salt Lake City), research and analysis of non-traditional transit attributes in mode choice models, awareness of transit services, and recommendations for bringing these analyses into practice. Phase II will include data collection for two additional case study cities (Chicago and Charlotte) with minor modifications based on limitations identified in Phase I, additional analyses where Phase I results indicated a need, and a demonstration of the research in practice for at least one case study city.  相似文献   
84.
The aim of this study was to assess proof of concept and usability of a maritime service website prototype in a full-mission ship bridge simulator through Swedish mariners’ experiences and perceptions. This test was part of the European Commission’s EfficienSea2 project for e-navigation. The prototype was intended as an aid to existing standard systems and methodologies for planning, executing and monitoring voyages. The study began with 5 days of simulator trials focused on today’s standard practices. This served as a baseline to compare to subsequent 4 days of simulator trials testing the prototype. For data collection, observations, video footage, interviews, and eye tracking were used. Data analysis included breaking apart the qualitative data to capture the perceptions of the participants, and a preliminary analysis of eye-tracking data as a complement. The results suggested that the prototype could be more suitable for a route planning stage, that the participants were familiar with similar existing solutions from other manufacturers, and that the contents of the tool would be most beneficial if integrated within the Electronic Chart Display and Information Systems (ECDIS). There is a pressing need for the novel solutions to be user needs-driven, integrated with the existing technologies, and standardized across the domain, and these processes must go hand-in-hand with accounting for all involved stakeholders, procedures, regulations, and training, as this will alter the course of shipping.  相似文献   
85.
Radar target signals and chaff cloud jamming signals have different characters by the wavelet transform. The wavelet coefficients of radar target signals are highly correlated with its near-and-near-scale wavelet coefficients, however the correlativity between the wavelet coefficients of chaff cloud jamming signals and its near-and-near scale wavelet coefficients is less significant. Based on the binary-base discrete wavelet transform and the correlation algorithm, the method of target entropy to estimate standard variance of the jamming signals and each scale is proposed to ensure reasonable threshold, to suppress chaff cloud signals and finally to reconstruct mixed signals by the improved spatially selective noise filtration (ISSNF) method. The extensive simulation results show that the proposed method can availably suppress chaff cloud jamming and decontaminate target echo.  相似文献   
86.
This article discusses the enforcement of shipping standards, with a particular focus on Part XII of UNCLOS. Section 6 of Part XII contains the only comprehensive set of vessel-related enforcement provisions in the Convention, but the Part’s scope is limited to “the preservation and protection of the marine environment.” Therefore, not all shipping standards fall clearly within Part XII’s ambit, including those centered on safety, security, and crewing considerations. The enforcement provisions of Section 6 are favorable to flag states and their vessels, and Section 7 contains a number of safeguards for their benefit, so it is in the interests of these parties to have coastal state enforcement governed by Part XII. However, the ability of coastal states to establish and enforce shipping standards that apply within the territorial sea extends to more than just environmental matters. The result is that different standards give rise to different enforcement powers, depending on the maritime zone in which a vessel is located, even if those standards arise from the same international agreement. It is suggested that to remedy these problems, UNCLOS would need to be amended in order to provide a comprehensive enforcement regime for the enforcement of shipping standards.  相似文献   
87.
88.
A novel method toward color image segmentation is proposed based on edge linking and region grouping. Firstly, the edges extracted by the Canny detector are linked to form regions. Each of the end points of edges is connected by a direct line to the nearest pixel on another edge segment within a sub-window. A new distance is defined based on the feature that the edge tends to preserve its original direction. By sampling the lines to the image, the image is over-segmented to labeled regions. Secondly, the labeled regions are grouped both locally and globally. A decision tree is constructed to decide the importance of properties that affect the merging procedure. Finally, the result is refined by user’s selection of regions that compose the desired object. Experiments show that the method can effectively segment the object and is much faster than the state-of-the-art color image segmentation methods.  相似文献   
89.
A multi‐objective, time‐staged network‐design problem is formulated. Through transformation, the problem is decomposed into a set of single‐period, single‐objective problems. Lexicographic ordering is instrumental in effecting this transformation; it also allows a backward‐recursion algorithm to be applied using strong pruning criteria. Furthermore, monotonicity properties enable us to solve the problem using the familiar tree‐search algorithms. The solution method has several desirable properties — as shown by an example and a case study of Tripoli Province, Libya. First, the algorithm ensures continuity of project implementation over the multi time‐periods and provides optimality in later computational stages irrespective of the decision at an interim stage. Second, the algorithm tends to provide accessibility to unconnected regions in the study area at low user‐cost without employing weights to the two objective functions of accessibility and user‐cost efficiency. Such a property is deemed advantageous for suggesting transportation investments based purely on purchasing the greatest benefit for each dollar, with political neutrality strictly maintained.  相似文献   
90.
Democratic group signature (DGS) is a group-oriented primitive with great flexibilities, i.e., no group manager, anonymity, and traceability. In a DGS scheme with (t, n)-threshold traceability, any subset of not less than t members can jointly reveal the identity of the signer while preserving security even in the presence of an active adversary can corrupt up to t − 1 group members. This paper proposes an efficient DGS scheme. We use publicly verifiable secret sharing (PVSS) to distribute the trapdoor via which the real signer is revealed. The computation cost and communication overhead of our DGS signatures are greatly reduced, compared with the existing work. For example, the size of the resulting signature contains only 2n + 1 elements of Z q , except the PVSS output.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号