全文获取类型
收费全文 | 5676篇 |
免费 | 271篇 |
专业分类
公路运输 | 1624篇 |
综合类 | 1656篇 |
水路运输 | 1513篇 |
铁路运输 | 942篇 |
综合运输 | 212篇 |
出版年
2024年 | 11篇 |
2023年 | 46篇 |
2022年 | 127篇 |
2021年 | 227篇 |
2020年 | 173篇 |
2019年 | 94篇 |
2018年 | 98篇 |
2017年 | 88篇 |
2016年 | 93篇 |
2015年 | 174篇 |
2014年 | 243篇 |
2013年 | 319篇 |
2012年 | 404篇 |
2011年 | 484篇 |
2010年 | 479篇 |
2009年 | 435篇 |
2008年 | 401篇 |
2007年 | 491篇 |
2006年 | 450篇 |
2005年 | 328篇 |
2004年 | 113篇 |
2003年 | 127篇 |
2002年 | 150篇 |
2001年 | 145篇 |
2000年 | 103篇 |
1999年 | 33篇 |
1998年 | 18篇 |
1997年 | 14篇 |
1996年 | 18篇 |
1995年 | 14篇 |
1994年 | 8篇 |
1993年 | 12篇 |
1992年 | 6篇 |
1991年 | 8篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 4篇 |
1987年 | 1篇 |
1986年 | 1篇 |
排序方式: 共有5947条查询结果,搜索用时 0 毫秒
991.
以临界平面法疲劳裂纹萌生寿命预测方法为系统数学模型,采用单参数敏感性分析方法,分析了钢轨材质参数(弹性模量、泊松比、屈服强度和抗拉强度)对疲劳裂纹萌生寿命的影响,计算了各参数的敏感度因子.计算结果表明:疲劳裂纹萌生寿命对弹性模量和屈服强度最敏感,而对泊松比不敏感.这一计算结果与试验统计结果相吻合.通过敏感性分析,认为在确定钢轨材质参数取值时要对弹性模量、屈服强度和抗拉强度的准确性高度重视;提高材料的抗疲劳性能应从提高材料的屈服强度入手,建议规范中增加对钢轨材质屈服强度的要求. 相似文献
992.
基于蚂蚁算法和元胞自动机各自的原理,提出一种元胞蚂蚁耦合算法及其数学描述,并将该模型探索性的用于边坡安全系数优化问题的求解中.算法在MATLAB环境下进行实现.通过工程数据进行验证和测试,证明其良好的效果. 相似文献
993.
Various flexible mechanisms related to quality of service (QoS) provisioning have been specified for uplink traffic at the
medium access control (MAC) layer in the IEEE 802.16 standards. Among the mechanisms, contention based bandwidth request scheme
can be used to indicate bandwidth demands to the base station for the non-real-time polling and best-effort services. These
two services are used for most applications with unknown traffic characteristics. Due to the diverse QoS requirements of those
applications, service differentiation (SD) is anticipated over the contention based bandwidth request scheme. In this paper
we investigate the SD with the bandwidth request scheme by means of assigning different channel access parameters and bandwidth
allocation priorities at different packets arrival probability. The effectiveness of the differentiation schemes is evaluated
by simulations. It is observed that the initial backoff window can be efficient in SD, and if combined with the bandwidth
allocation priority, the SD performances will be better.
Foundation item: the National Basic Research Program (973) of China (No. 2005C13321804) 相似文献
994.
We describe a batch RSA digital signature scheme in which a signer can sign messages for multiple recipients simultaneously.
The construction is quite efficient due to the batch signing method. This is useful to improve the performance of a high-loaded
signing server, for example a secure electronic transaction (SET) gateway. Theoretical calculations and experimental results
show that the proposed scheme can improve the performance of the signing server significantly.
Foundation item: the National Basic Research Program (973) of China (No. 2005CB321804) 相似文献
995.
In this paper, we study an area localization problem in large scale underwater wireless sensor networks (UWSNs). The limited
bandwidth, the severely impaired channel and the cost of underwater equipment all make the underwater localization problem
very challenging. Exact localization is very difficult for UWSNs in deep underwater environment. We propose a range free method
based on mobile detachable elevator transceiver (DET) and 3D multi-power area localization scheme (3D-MALS) to address the
challenging problem. In the proposed scheme, the ideas of 2D multi-power area localization scheme (2D-ALS) and utilizing DET
are used to achieve the simplicity, location accuracy, scalability and low cost performances. The DET can rise and get down
to broadcast its position. And it is assumed that all the underwater nodes underwater have pressure sensors and know their
z coordinates. We evaluate the performances of 2D-ALS and our proposed 3D-MALS schemes under both ideal and non-ideal channel
propagation conditions, in terms of localization error and localization ratio. The simulation results show that our proposed
scheme is much more efficient than the 2D-ALS. 相似文献
996.
Mobile ad hoc networks are often deployed in environments where the nodes of the networks are unattended and have little or
no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks
are particularly vulnerable to denial of service (DoS) attacks launched through compromised nodes or intruders. In this paper,
we investigated the effects of flooding attacks in network simulation 2 (NS-2) and measured the packet delivery ratio and
packet delay under different flooding frequencies and different numbers of attack nodes. Simulation results show that with
the increase the flooding frequencies and the numbers of attack nodes, network performance drops. But when the frequency of
flooding attacks is greater than a value, the performance decrease gets smooth. Meanwhile the packet delay firstly increases
and then declines to a value of stability at the end. 相似文献
997.
Auto CAD绘图技巧之教学浅析 总被引:1,自引:0,他引:1
在Auto CAD教学绘图过程中,作者探索出一些能够提高绘图效率的实用技巧。本文主要介绍了如何使用Auto CAD技巧的方法,包括利用相对坐标法捕捉、形位公差的修改等辅助工具以及设置文字样板、点划线、块等命令来提高绘图速度的技巧。 相似文献
998.
解析高职院校项目教学法中教师的角色 总被引:5,自引:0,他引:5
随着现代科学技术及生产组织形式对职业教育要求的不断提高,项目教学法越来越突显出其在高职院校教学过程中培养学生实践能力、社会能力及其他关键能力的重要性。本文在明确高职院校项目教学法内涵的基础上,揭示教师在项目教学法实施过程中应扮演的角色,并在此基础上设计出教师角色模型,并对角色综合运用产生的扩散效应进行阐述。 相似文献
999.
通过对玉柴2.5L4F国Ⅱ柴油机进行试验优化升级来匹配某轻型车国Ⅲ机的排放要求.试验主要针对电控燃油喷射系统中的喷油器锥角、突出高度、增压器、EGR进行优化升级,结果表明样机能够满足国Ⅲ排放要求. 相似文献
1000.