首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2072篇
  免费   6篇
公路运输   223篇
综合类   660篇
水路运输   722篇
铁路运输   5篇
综合运输   468篇
  2022年   3篇
  2021年   8篇
  2020年   9篇
  2019年   8篇
  2018年   346篇
  2017年   296篇
  2016年   254篇
  2015年   8篇
  2014年   9篇
  2013年   56篇
  2012年   72篇
  2011年   218篇
  2010年   221篇
  2009年   60篇
  2008年   186篇
  2007年   127篇
  2006年   4篇
  2005年   54篇
  2004年   46篇
  2003年   61篇
  2002年   17篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1997年   2篇
  1995年   1篇
  1991年   2篇
  1990年   2篇
  1985年   2篇
  1973年   1篇
排序方式: 共有2078条查询结果,搜索用时 15 毫秒
661.
Modern highly reliable products may have two or more quality characteristics (QCs) because of their complex structures and abundant functions. Relations between the QCs should be considered when assessing the reliability of these products. This paper conducts a Bayesian analysis for a bivariate constant-stress accelerated degradation model based on the inverse Gaussian (IG) process. We assume that the product considered has two QCs and each of the QCs is governed by an IG process. The relationship between the QCs is described by a Frank copula function. We also assume that the stress on the products affects not only the parameters of the IG processes, but also the parameter of the Frank copula function. The Bayesian MCMC method is developed to calculate the maximum likelihood estimators (MLE) of the model parameters. The reliability function and the mean-time-to-failure (MTTF) are estimated through the calculation of the posterior samples. Finally, a simulation example is presented to illustrate the proposed bivariate constant-stress accelerated degradation model.  相似文献   
662.
Whereas the Marine Insurance Act 1906 provides substantial detail about total losses, very little is provided in relation to piracy in the said statute. The recent judgments in Masefield v Amlin by Steel J ([2010] 1Lloyd's Rep. IR 345) and then by the English Court of Appeal ([2011] EWCA Civ 24) have highlighted the difficulties associated with determining whether a seizure of the subject-matter of insurance, in this case cargo, by pirates, demanding a ransom, can give rise to a claim for a total loss. This is a very important matter which also raises issues of legality and public policy. This article examines the implications of this judgment against the backdrop of the English marine insurance definition of piracy and the intricacies of the law relating to constructive and actual total losses. The article concludes with the suggestion that possibly the marine insurance definition of piracy should tally with that in the domain of public international law, and further, that legislative intervention should be considered for the purpose of ascertaining the point in time whether and when seizure by pirates can constitute a total loss.  相似文献   
663.
Piracy is one of the most frequent maritime threats. However, despite the importance of how maritime piracy is to be reduced, it is substantially less investigated than maritime safety. Piracy off Somalia is the most investigated case of piracy, but those results are not necessarily generalizable. Piracy off West Africa has been shown to be more diverse, successful and dangerous. This study investigates and analyses piracy off West Africa with the aim to understand how different operations and security measures affect the consequences of piracy. This study has identified several different intents and shows that most attacks are relatively close to shore and correspond to areas of high ship density. Attacks with the intent of theft at night-time are generally performed close to shore, and more complicated attacks against ships under way are more common during daytime and farther from shore. Five types of measures are found to have high effectiveness if the attack is detected during approach; after boarding, only two measures have high effectiveness. Of the effective measures, it can be concluded that all but one are dependent on detecting the attack. Therefore, detecting the pirates is key but must be accompanied by a set of measures because no measure alone can protect a ship given the operational conditions off West Africa. The risks associated with piracy off West Africa are estimated to be of the same magnitude as the risks posed by Somali piracy at its peak.  相似文献   
664.
The deep understanding on sand and sand dunes scale can be useful to reveal the formation mechanism of the sandstorm for early sandstorm forecast. The current sandstorm observation methods are mainly based on conventional meteorological station and satellites remote sensing, which are difficult to acquire sand scale information. A wireless sensing network is implemented in the hinterland of desert, which includes ad hoc network, sensor, global positioning system (GPS) and system integration technology. The wireless network is a three-layer architecture and daisy chain topology network, which consists of control station, master robots and slave robots. Every three robots including one master robot and its two slave robots forms an ad hoc network. Master robots directly communicate with radio base station. Information will be sent to remote information center. Data sensing system including different kinds of sensors and desert robots is developed. A desert robot is designed and implemented as unmanned probing movable nodes and sensors’ carrier. A new optical fiber sensor is exploited to measure vibration of sand in particular. The whole system, which is delivered to the testing field in hinterland of desert (25 km far from base station), has been proved efficient for data acquisition.  相似文献   
665.
Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworthiness that is based on the knowledge related to the peer's identity, while identity privacy is usually achieved by hiding such knowledge. A trust model based on trusted computing (TC) technology was proposed to enhance the identity privacy of peers during the trustworthiness evaluation process between peers from different groups. The simulation results show that, the model can be implemented in an efficient way, and when the degree of anonymity within group (DAWG) is up to 0.6 and the percentage of malicious peers is up to 70%7 the service selection failure rate is less than 0.15.  相似文献   
666.
Linux has a special feature of automount in the Linux kernel. Filesystem can be mounted and unmounted automatically. Its performance is similar to MS Windows. It works well under demands of more saving resources and automatization, like memory of system. An approach to install/update software automatically on embedded platform was proposed. This approach derives from above feature based on embedded environment with Linux OS. Configurations of files related to this feature were introduced. An example in practice was given to realize this approach from universal serial bus (USB) memory disk when USB disk is available.  相似文献   
667.
An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, both of which make an exchange protocol more practical. The scheme is unconditionally secure against the cheating signer, its security against the cheating verifier is reduced to the computational Diffie-Hellman (CDH) problem in the underlying group, it is secure against the cheating trusted third party if the underlying Paterson Schuldt's identity based signature (IBS) scheme is secure, which is proven true based on the CDH assumption in the standard model.  相似文献   
668.
A novel intelligent drug delivery system potential for the more effective therapy of the diabeticswas proposed, and the composition of system was analyzed. Based on the design of micro-electro-mechanicalsystems (MEMS), an iterative modeling process was introduced. Unified modeling language (UML) was em-ployed to describe the function requirement, and different diagrams were built up to explore the static model,the dynamic model and the employment model. The mapping analysis of different diagrams can simply verifythe consistency and completeness of the system model.  相似文献   
669.
In the US, the rise in motorized vehicle travel has contributed to serious societal, environmental, economic, and public health problems. These problems have increased the interest in encouraging non-motorized modes of travel (walking and bicycling). The current study contributes toward this objective by identifying and evaluating the importance of attributes influencing bicyclists’ route choice preferences. Specifically, the paper examines a comprehensive set of attributes that influence bicycle route choice, including: (1) bicyclists’ characteristics, (2) on-street parking, (3) bicycle facility type and amenities, (4) roadway physical characteristics, (5) roadway functional characteristics, and (6) roadway operational characteristics. The data used in the analysis is drawn from a web-based stated preference survey of Texas bicyclists. The results of the study emphasize the importance of a comprehensive evaluation of both route-related attributes and bicyclists’ demographics in bicycle route choice decisions. The empirical results indicate that travel time (for commuters) and motorized traffic volume are the most important attributes in bicycle route choice. Other route attributes with a high impact include number of stop signs, red light, and cross-streets, speed limits, on-street parking characteristics, and whether there exists a continuous bicycle facility on the route.
Chandra R. Bhat (Corresponding author)Email:

Ipek N. Sener   is currently a Ph.D. candidate in transportation engineering at The University of Texas at Austin. She received her M.S. degrees in Civil Engineering and in Architecture, and her B.S. degree in Civil Engineering from the Middle East Technical University in Ankara, Turkey. Naveen Eluru   is currently a Ph.D. candidate in transportation engineering at The University of Texas at Austin. He received his M.S. degree in Civil Engineering from The University of Texas at Austin, and his Bachelors in Technology Degree from Indian Institute of Technology in Madras, India. Chandra R. Bhat   is a Professor in Transportation at The University of Texas at Austin. He has contributed toward the development of advanced econometric techniques for travel behavior analysis, in recognition of which he received the 2004 Walter L. Huber Award and the 2005 James Laurie Prize from the American Society of Civil Engineers (ASCE), and the 2008 Wilbur S. Smith Distinguished Transportation Educator Award from the Institute of Transportation Engineers (ITE). He is the immediate past chair of the Transportation Research Board Committee on Transportation Demand Forecasting and the International Association for Travel Behaviour Research.  相似文献   
670.
This paper develops a comprehensive approach to the definition of transportation analysis zones (TAZ), and therein, presents a new methodology and algorithm for the definition of TAZ embedded in geographic information systems software, improves the base algorithm with several local algorithms, and comprehensively analyses the obtained results. The results obtained are then compared to these presently used in the transportation analysis process of the Lisbon Metropolitan Area. The proposed algorithm presents a new methodology for TAZ design based on a smoothed density surface of geocoded travel demand data. The algorithm aims to minimise the loss of information when moving from a continuous representation of the origin and destination of each trip to their discrete representations through zones, and focuses on the trade-off between the statistical precision, geographical error, and the percentage of intra-zonal trips of the resulting OD matrix. The results for the Lisbon Metropolitan Area case study suggest a significant improvement in OD matrix estimates compared to current transportation analysis practises based on administrative units.
Elisabete A. SilvaEmail:

Luis M. Martínez   is a Civil Engineer from the Instituto Superior Técnico, Technical University of Lisbon since 2004. After finishing his degree, he started his work as researcher in the CESUR (Civil Engineering & Architecture Department—Instituto Superior Técnico) where he has been working since. In 2006 he completed his Master Thesis at Instituto Superior Técnico on Traffic Analysis Zones modeling and started his PhD studies on the theme: Metropolitan Transportation Systems Financing Using the Value Capture Concept. José Manuel Viegas   is Full Professor of Transportation at the Civil Engineering & Architecture Department of the Instituto Superior Técnico, Technical University of Lisbon. He has worked extensively in Modeling, Innovation and Policy in several types of Transport Systems. He was founder and first Director General of Transportnet, a group of eight leading European Universities with Advanced Studies in Transportation, and currently leads the Portuguese side of the Transportation Systems area in the MIT—Portugal program. Elisabete A. Silva   is at the University of Cambridge (University Lecturer in Planning at the Department of Land Economy and a Fellow of Robinson College). With more than 100 contributions in peer review journals, books/books chapters, conference proceedings, and a research track record of approximately 16 years, (both at the public and private sector), her research interests are centred on the application of new technologies to spatial planning in particular city and metropolitan dynamic modelling through time.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号