首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2457篇
  免费   11篇
公路运输   267篇
综合类   673篇
水路运输   881篇
铁路运输   12篇
综合运输   635篇
  2022年   3篇
  2021年   2篇
  2020年   3篇
  2019年   13篇
  2018年   343篇
  2017年   309篇
  2016年   258篇
  2015年   11篇
  2014年   14篇
  2013年   145篇
  2012年   72篇
  2011年   218篇
  2010年   253篇
  2009年   79篇
  2008年   205篇
  2007年   149篇
  2006年   19篇
  2005年   66篇
  2004年   48篇
  2003年   58篇
  2002年   33篇
  2001年   4篇
  2000年   11篇
  1999年   5篇
  1998年   8篇
  1997年   6篇
  1996年   13篇
  1995年   10篇
  1994年   6篇
  1993年   10篇
  1992年   8篇
  1991年   8篇
  1990年   2篇
  1989年   2篇
  1988年   3篇
  1987年   6篇
  1986年   4篇
  1985年   4篇
  1983年   4篇
  1982年   4篇
  1981年   6篇
  1980年   1篇
  1979年   6篇
  1978年   7篇
  1977年   2篇
  1976年   7篇
  1975年   9篇
  1974年   4篇
  1973年   5篇
  1972年   2篇
排序方式: 共有2468条查询结果,搜索用时 15 毫秒
141.
High performance computer is often required by model predictive control (MPC) systems due to the heavy online computation burden. To extend MPC to more application cases with low-cost computation facilities, the implementation of MPC controller on field programmable gate array (FPGA) system is studied. For the dynamic matrix control (DMC) algorithm, the main design idea and the implemental strategy of DMC controller are introduced based on a FPGA’s embedded system. The performance tests show that both the computation efficiency and the accuracy of the proposed controller can be satisfied due to the parallel computing capability of FPGA.  相似文献   
142.
Radar target signals and chaff cloud jamming signals have different characters by the wavelet transform. The wavelet coefficients of radar target signals are highly correlated with its near-and-near-scale wavelet coefficients, however the correlativity between the wavelet coefficients of chaff cloud jamming signals and its near-and-near scale wavelet coefficients is less significant. Based on the binary-base discrete wavelet transform and the correlation algorithm, the method of target entropy to estimate standard variance of the jamming signals and each scale is proposed to ensure reasonable threshold, to suppress chaff cloud signals and finally to reconstruct mixed signals by the improved spatially selective noise filtration (ISSNF) method. The extensive simulation results show that the proposed method can availably suppress chaff cloud jamming and decontaminate target echo.  相似文献   
143.
An efficient method is proposed for the design of finite impulse response (FIR) filter with arbitrary pass band edge, stop band edge frequencies and transition width. The proposed FIR band stop filter is designed using craziness based particle swarm optimization (CRPSO) approach. Given the filter specifications to be realized, the CRPSO algorithm generates a set of optimal filter coefficients and tries to meet the ideal frequency response characteristics. In this paper, for the given problem, the realizations of the optimal FIR band pass filters of different orders have been performed. The simulation results have been compared with those obtained by the well accepted evolutionary algorithms, such as Parks and McClellan algorithm (PMA), genetic algorithm (GA) and classical particle swarm optimization (PSO). Several numerical design examples justify that the proposed optimal filter design approach using CRPSO outperforms PMA and PSO, not only in the accuracy of the designed filter but also in the convergence speed and solution quality.  相似文献   
144.
For the task of visual-based automatic product image classification for e-commerce, this paper constructs a set of support vector machine (SVM) classifiers with different model representations. Each base SVM classifier is trained with either different types of features or different spatial levels. The probability outputs of these SVM classifiers are concatenated into feature vectors for training another SVM classifier with a Gaussian radial basis function (RBF) kernel. This scheme achieves state-of-the-art average accuracy of 86.9% for product image classification on the public product dataset PI 100.  相似文献   
145.
Distributed information systems require complex access control which depends upon attributes of protected data and access policies. Traditionally, to enforce the access control, a file server is used to store all data and act as a reference to check the user. Apparently, the drawback of this system is that the security is based on the file server and the data are stored in plaintext. Attribute-based encryption (ABE) is introduced first by Sahai and Waters and can enable an access control mechanism over encrypted data by specifying the users’ attributes. According to this mechanism, even though the file server is compromised, we can still keep the security of the data. Besides the access control, user may be deprived of the ability in some situation, for example paying TV. More previous ABE constructions are proven secure in the selective model of security that attacker must announce the target he intends to attack before seeing the public parameters. And few of previous ABE constructions realize revocation of the users’ key. This paper presents an ABE scheme that supports revocation and has full security in adaptive model. We adapt the dual system encryption technique recently introduced by Waters to ABE to realize full security.  相似文献   
146.
Photoacoustic imaging acquires the absorption contrast of biological tissue with ultrasound resolution. It has been broadly investigated in biomedicine for animal and clinical studies. Recently, a micro-electro-mechanical system (MEMS) scanner has been utilized in photoacoustic imaging systems to enhance their performance and extend the realm of applications. The review provides a recap of recent developments in photoacoustic imaging using MEMS scanner, from instrumentation to applications. The topics include the design of MEMS scanner, its use in photoacoustic microscopy, miniature imaging probes, development of dual-modality systems, as well as cutting-edge bio-imaging studies.  相似文献   
147.
Full duplex communication highly improves spectrum efficiency of a wireless communication link. However, when it is applied to a cellular network, the capacity gain from this technology remains unknown. The reason is that full duplex communication changes the aggregate interference experienced by each communication link in cellular networks. In this paper, the capacity gain from full duplex communication is studied for cellular networks of 4G and beyond, where the same frequency channel is adopted in each cell. A two-layer Poisson point process (PPP) is adopted to model the network topology, and stochastic geometry is employed to derive the coverage probability and the average capacity of typical link in a cellular network. On the basis of these derived parameters, the capacity gain from full duplex communication is determined. Numerical results reveal that without mutual interference cancellation (MIC), the capacity gain is small under various power levels; with perfect MIC at base stations, the capacity gain can exceed 60%; with imperfect MIC at base stations, the capacity gain decreases quickly even with a slight drop of MIC performance.  相似文献   
148.
With the simultaneous rise of energy costs and demand for cloud computing, efficient control of data centers becomes crucial. In the data center control problem, one needs to plan at every time step how many servers to switch on or off in order to meet stochastic job arrivals while trying to minimize electricity consumption. This problem becomes particularly challenging when servers can be of various types and jobs from different classes can only be served by certain types of server, as it is often the case in real data centers. We model this problem as a robust Markov decision process (i.e., the transition function is not assumed to be known precisely). We give sufficient conditions (which seem to be reasonable and satisfied in practice) guaranteeing that an optimal threshold policy exists. This property can then be exploited in the design of an efficient solving method, which we provide. Finally, we present some experimental results demonstrating the practicability of our approach and compare with a previous related approach based on model predictive control.  相似文献   
149.
Post-tensioned concrete rocking walls might be used to avoid severe seismic damage at the base of structural walls, decrease residual drift, and lessen post-earthquake repair costs. The prediction of load-induced damage to the rocking wall resulting from seismic loading can provide an extremely valuable tool to evaluate the status and safety of structural concrete walls following earthquakes. In this study, the behavior and the damage state of monolithic, self-centering, rocking walls, as a new type of concrete rocking wall, are investigated. The nonlinear mechanical behavior of the wall is first modeled numerically, and subsequently the mechanical parameters from the numerical simulation are used to generate the local damage index. The results from the damage index model are compared with the full-scale test results, confirming the viability of the numerically based damage index method for estimating the seismically induced damage in concrete walls. Moreover, the estimated damage can be utilized as a qualitative and quantitative scale to assess the status of the wall following seismic loading events. Finally, an equation is proposed to estimate the repair cost based on the predicted damage state for the studied structural system.  相似文献   
150.
Along with higher and higher integration of intellectual properties (IPs) on a single chip, traditional bus-based system-on-chips (SoC) meets several design difficulties (such as low scalability, high power consumption, packet latency and clock tree problem). As a promising solution, network-on-chips (NoC) has been proposed and widely studied. In this work, a novel algorithm for NoC topology synthesis, which is decomposing and cluster refinement (DCR) algorithm, has been proposed to minimize the total power consumption of application-specific NoC. This algorithm is composed of two stages: decomposing with cluster generation, and cluster refinement. For partitioning and cluster generation, an initial low-power solution for NoC topology is generated. For cluster refinement, the clustering is optimized by performing floorplan to further reduce power consumption. Meanwhile, a good tradeoff between power consumption and CPU time can be achieved. Experimental results show that the proposed method outperforms the existing work.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号