首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2430篇
  免费   12篇
公路运输   351篇
综合类   797篇
水路运输   823篇
铁路运输   85篇
综合运输   386篇
  2022年   8篇
  2021年   10篇
  2020年   21篇
  2019年   6篇
  2018年   339篇
  2017年   297篇
  2016年   256篇
  2015年   18篇
  2014年   18篇
  2013年   46篇
  2012年   85篇
  2011年   240篇
  2010年   254篇
  2009年   79篇
  2008年   222篇
  2007年   181篇
  2006年   50篇
  2005年   94篇
  2004年   49篇
  2003年   69篇
  2002年   28篇
  2001年   18篇
  2000年   9篇
  1999年   8篇
  1998年   4篇
  1997年   6篇
  1996年   10篇
  1995年   1篇
  1994年   1篇
  1993年   2篇
  1992年   6篇
  1991年   3篇
  1990年   1篇
  1989年   1篇
  1988年   2篇
排序方式: 共有2442条查询结果,搜索用时 62 毫秒
251.
为了研究冻融循环对不同塑性路基土剪切强度的影响,通过室内三轴试验和冻融循环试验对3种塑性指数的土样进行了研究。结果得到:当冻融循环次数增加时,剪切强度随着塑性指标的增加而有所增大;当塑性指数相同时,剪切强度随冻融次数增加与围压增加改变各不相同,与冻融循环次数成反比,与围压成正比。并且冻融循环6~7次后,3种塑性指数土样的剪切强度的变化均会趋于平缓。  相似文献   
252.
A mechanical model of visco-elastic material is established in order to investigate viscous effect in dynamic growing crack-tip field of mode Ⅱ. It is shown that in stable creep growing phase, elastic deformation and viscous deformation are equally dominant in the near-tip field, the stress and strain have the same singularity, namely, (σε) ∝r^-1/(n-1). The asymptotic solutions of separatied variables of stress, stain and displacement in crack-tip field are obtained by asymptotic analysis, and the results of numerical value of stress and strain in crack-tip field are obtained by shooting method. Through numerical calculation, it is shown that the near-tip fields are mainly governed by the creep exponent n and Mach number M. By the asymptotic analysis to the crack-tip field, the fracture criterion of mode Ⅱ dynamic growing crack of visco-elastic materials is put forward from the point of view of strain.  相似文献   
253.
Distributed information systems require complex access control which depends upon attributes of protected data and access policies. Traditionally, to enforce the access control, a file server is used to store all data and act as a reference to check the user. Apparently, the drawback of this system is that the security is based on the file server and the data are stored in plaintext. Attribute-based encryption (ABE) is introduced first by Sahai and Waters and can enable an access control mechanism over encrypted data by specifying the users’ attributes. According to this mechanism, even though the file server is compromised, we can still keep the security of the data. Besides the access control, user may be deprived of the ability in some situation, for example paying TV. More previous ABE constructions are proven secure in the selective model of security that attacker must announce the target he intends to attack before seeing the public parameters. And few of previous ABE constructions realize revocation of the users’ key. This paper presents an ABE scheme that supports revocation and has full security in adaptive model. We adapt the dual system encryption technique recently introduced by Waters to ABE to realize full security.  相似文献   
254.
如何节油是人与汽车科学结合中出现的课题。为了减小这种矛盾关系,介绍了车辆参数变化后多耗油的过程,以及驾驶员容易忽视的驾驶细节对油耗的影响。分析了驾驶中正确运用高档低速,经济车速,滑行行驶等节油方法和原理。注意这些细节,运用这些技巧,并成为习惯,会比普通车手平均省油8~10%。  相似文献   
255.
Aiming at the problem that the fast tracking algorithm using spatio-temporal context (STC) will inevitably lead to drift and even lose the target in long-term tracking, a new algorithm based on spatio-temporal context that integrates long-term tracking with detecting is proposed in this paper. We track the target by the fast tracking algorithm, and the cascaded search strategy is introduced to the detecting part to relocate the target if the fast tracking fails. To a large extent, the proposed algorithm effectively improves the accuracy and stability of long-term tracking. Extensive experimental results on benchmark datasets show that the proposed algorithm can accurately track and relocate the target though the target is partially or completely occluded or reappears after being out of the scene.  相似文献   
256.
Circuit net list bipartitioning using simulated annealing technique has been proposed in the paper. The method converges asymptotically and probabilistically to global optimization. The circuit net list is partitioned into two partitions such that the number of interconnections between the partitions is minimized. The proposed method begins with an innovative clustering technique to obtain a good initial solution. Results obtained show the versatility of the proposed method in solving non polynomial hard problems of circuit net list partitioning and show an improvement over those available in literature.  相似文献   
257.
In a coil box between the roughing and finishing stands on a hot strip mill, a problem has been encountered that the entry region of the plate touches the bending rolls and deforms. As a result, the defective coil occurs. The condition of plate bending, which forms a new deformation feature in coiling, is analyzed. In this paper, the authors focus on the research of the effects of coiling parameters, such as the thickness of plate, roll speed and feeding speed of plate in coil box, and on specific plate bending. A finite element method is developed to simulate this coiling process. Based on numerical simulation, the effects of the coiling parameters on the mechanics and deformation of the bending plate are obtained. Numerical simulation tests have verified the validity of the developed model.  相似文献   
258.
A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the range of a specified reader so that an off-line verifier can verify the proofs later. This proof has found several interesting applications. However, many existing RFID yoking schemes are vulnerable to replay attacks. To overcome the weaknesses, Cho et al. proposed a new RFID yoking proof protocol and a new grouping protocol. Unfortunately, Cho et al.’s schemes are still vulnerable to replay attacks. In this paper, in addition to demonstrating weaknesses, we further discuss the rationale behind these weaknesses to provide a guide line for designing secure RFID yoking schemes. Based on the guide line, we propose a new RFID yoking scheme and a new RFID grouping scheme. Performance evaluation shows that our scheme outperforms its counterparts.  相似文献   
259.
This study is focused on tools used in the industrial hot forging process of a front wheel forging (eventually–gear wheel) manufactured for the automotive industry. Four different variants were applied for the tools: 2 die inserts were coated with two different hybrid layers (GN + PVD type), i.e. AlCrTiN and AlCrTiSiN, one insert was only nitrided, and one was pad welded, to improve tool durability. The tool wear was analysed and represented by the material degradation on the working surface, based on the 3D scanning and the material growth of the periodically collected forgings. Additionally, the scanned tools were divided into two areas, in which it was found, based on the reliminary analysis, that various degradation mechanisms are predominant. Microstructural and hardness measurements of the analyzed tools were also performed. Based on the results, it was found that, in the central part of the die insert (area A), thermo-mechanical fatigue and wear occurred, while in the area of the bridge insert (area B), only abrasive wear could be observed. For these areas (A and B), the loss of material was determined separately. In area A for the inserts with hybrid layer GN+AlCrTiSiN and gas nitrided, an intensive increase of wear took place, which was not observed for the pad welded and GN+AlCrTiN layer insert, for which, together with the increase of the forging number, a proportional growth of the loss of material occurred. In area B the weakest results were obtained for the insert with GN+AlCrTiSiN layer, while wear of other die inserts grew similar and proportional.  相似文献   
260.
Hydrostatic stresses of copper dual-damascene interconnects are calculated by a commercial finite element software in this paper. The analytical work is performed to examine the effects of different low-k (k is permittivity) dielectrics, barrier layer and aspect ratio of via on hydrostatic stress distribution in the copper interconnects. The results of calculation indicate that the hydrostatic stresses are highly non-uniform throughout the copper interconnects and the highest tensile hydrostatic stress exists on the top interface of lower level interconnect near via. Both the high coefficient of thermal expansion and the low elastic modulus of the low-k dielectrics and barrier layer can decrease the highest hydrostatic stress on the top interface, which can improve the reliability of the copper interconnects.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号