全文获取类型
收费全文 | 4592篇 |
免费 | 107篇 |
专业分类
公路运输 | 1222篇 |
综合类 | 1148篇 |
水路运输 | 1273篇 |
铁路运输 | 918篇 |
综合运输 | 138篇 |
出版年
2024年 | 3篇 |
2023年 | 13篇 |
2022年 | 69篇 |
2021年 | 123篇 |
2020年 | 102篇 |
2019年 | 27篇 |
2018年 | 38篇 |
2017年 | 36篇 |
2016年 | 55篇 |
2015年 | 110篇 |
2014年 | 183篇 |
2013年 | 237篇 |
2012年 | 340篇 |
2011年 | 340篇 |
2010年 | 412篇 |
2009年 | 367篇 |
2008年 | 373篇 |
2007年 | 469篇 |
2006年 | 509篇 |
2005年 | 282篇 |
2004年 | 94篇 |
2003年 | 71篇 |
2002年 | 49篇 |
2001年 | 93篇 |
2000年 | 64篇 |
1999年 | 33篇 |
1998年 | 41篇 |
1997年 | 28篇 |
1996年 | 37篇 |
1995年 | 11篇 |
1994年 | 13篇 |
1993年 | 18篇 |
1992年 | 14篇 |
1991年 | 11篇 |
1990年 | 11篇 |
1989年 | 11篇 |
1988年 | 10篇 |
1985年 | 2篇 |
排序方式: 共有4699条查询结果,搜索用时 22 毫秒
871.
采用因子分析将公路运输枢纽载体城市的14项统计指标简化为3类综合因子,构建Koho-nen网络模型并输入综合因子变量得到公路运输枢纽的初步分类方案,通过F-统计量检验分类效果发现将所选44个公路运输枢纽分为4类最佳.结果表明,因子分析与Kohonen网络结合是一种有效的公路运输枢纽分类方法,公路运输枢纽具有较明显的4个层级结构. 相似文献
872.
Various flexible mechanisms related to quality of service (QoS) provisioning have been specified for uplink traffic at the
medium access control (MAC) layer in the IEEE 802.16 standards. Among the mechanisms, contention based bandwidth request scheme
can be used to indicate bandwidth demands to the base station for the non-real-time polling and best-effort services. These
two services are used for most applications with unknown traffic characteristics. Due to the diverse QoS requirements of those
applications, service differentiation (SD) is anticipated over the contention based bandwidth request scheme. In this paper
we investigate the SD with the bandwidth request scheme by means of assigning different channel access parameters and bandwidth
allocation priorities at different packets arrival probability. The effectiveness of the differentiation schemes is evaluated
by simulations. It is observed that the initial backoff window can be efficient in SD, and if combined with the bandwidth
allocation priority, the SD performances will be better.
Foundation item: the National Basic Research Program (973) of China (No. 2005C13321804) 相似文献
873.
We describe a batch RSA digital signature scheme in which a signer can sign messages for multiple recipients simultaneously.
The construction is quite efficient due to the batch signing method. This is useful to improve the performance of a high-loaded
signing server, for example a secure electronic transaction (SET) gateway. Theoretical calculations and experimental results
show that the proposed scheme can improve the performance of the signing server significantly.
Foundation item: the National Basic Research Program (973) of China (No. 2005CB321804) 相似文献
874.
Steel wire wound reinforced flexible pipe in this study mainly consists of multiple anisotropic steel wire wound reinforcement
layers and multiple isotropic rubber layers. Based on 3D anisotropic elastic theory, the analytic solutions of stresses and
elastic deformations of steel wire wound reinforced rubber flexible pipe under internal pressure are presented. As the adjacent
reinforcement layers with wound angle have different radii, the single reinforcement layer shows the effect of tensile-shear
coupling. Moreover, the static loading test results of steel wire wound reinforced rubber flexible pipe under internal pressure
are basically coincided with the calculated values by present method. 相似文献
875.
In this paper, we study an area localization problem in large scale underwater wireless sensor networks (UWSNs). The limited
bandwidth, the severely impaired channel and the cost of underwater equipment all make the underwater localization problem
very challenging. Exact localization is very difficult for UWSNs in deep underwater environment. We propose a range free method
based on mobile detachable elevator transceiver (DET) and 3D multi-power area localization scheme (3D-MALS) to address the
challenging problem. In the proposed scheme, the ideas of 2D multi-power area localization scheme (2D-ALS) and utilizing DET
are used to achieve the simplicity, location accuracy, scalability and low cost performances. The DET can rise and get down
to broadcast its position. And it is assumed that all the underwater nodes underwater have pressure sensors and know their
z coordinates. We evaluate the performances of 2D-ALS and our proposed 3D-MALS schemes under both ideal and non-ideal channel
propagation conditions, in terms of localization error and localization ratio. The simulation results show that our proposed
scheme is much more efficient than the 2D-ALS. 相似文献
876.
A computer-aided method to design a hybrid layout—tree-shape planar flowlines is presented. In newtype flowshop layout, the
common machines shared by several flowlines could be located together in functional sections. The approach combines traditional
cell formation techniques with sequence alignment algorithms. Firstly, a sequence analysis based cell formation procedure
is adopted; then the operation sequences for parts are aligned to maximize machines adjacency in hyperedge representations;
finally a tree-shape planar flowline will be obtained for each part family. With the help of a sample of operation sequences
obtained from industry, this algorithm is illustrated. 相似文献
877.
A novel algorithm to voxelize 3D mesh models with gray levels is presented in this paper. The key innovation of our method
is to decide the gray level of a voxel according to the total area of all surfaces contained by it. During the preprocessing
stage, a set of voxels in the extended bounding box of each triangle is established. Then we travel each triangle and compute
the areas between it and its set of voxels one by one. Finally, each voxel is arranged a discrete gray level from 0 to 255.
Experiments show that our algorithm gets a comparatively perfect result compared with the prevenient ones and approaches the
original models in a more accurate way. 相似文献
878.
Mobile ad hoc networks are often deployed in environments where the nodes of the networks are unattended and have little or
no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks
are particularly vulnerable to denial of service (DoS) attacks launched through compromised nodes or intruders. In this paper,
we investigated the effects of flooding attacks in network simulation 2 (NS-2) and measured the packet delivery ratio and
packet delay under different flooding frequencies and different numbers of attack nodes. Simulation results show that with
the increase the flooding frequencies and the numbers of attack nodes, network performance drops. But when the frequency of
flooding attacks is greater than a value, the performance decrease gets smooth. Meanwhile the packet delay firstly increases
and then declines to a value of stability at the end. 相似文献
879.
结合某车型制动踏板支架的逆向设计,介绍了基于曲面特征的建模策略和方法,详细分析了扫掠面和旋转面的重构方法,以及逆向设计建模过程中特征曲线提取的方法与技巧. 相似文献
880.
基于直接横摆力矩控制方法,设计了一种前馈一反馈补偿控制的车辆稳定性控制器.其中控制器以4WS为期望的车辆模型,通过前馈补偿控制可使车辆的质心侧偏角趋于理想值,而反馈补偿控制可使车辆模型在较好地跟踪理想模型的基础上,有效抵抗外界干扰.通过前轮角阶跃输入与正弦输入仿真,就控制效果的稳定性与对前轮转角的跟随特性两方面而言,所设计的控制系统能较好地控制车辆的操纵稳定性. 相似文献