首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4592篇
  免费   107篇
公路运输   1222篇
综合类   1148篇
水路运输   1273篇
铁路运输   918篇
综合运输   138篇
  2024年   3篇
  2023年   13篇
  2022年   69篇
  2021年   123篇
  2020年   102篇
  2019年   27篇
  2018年   38篇
  2017年   36篇
  2016年   55篇
  2015年   110篇
  2014年   183篇
  2013年   237篇
  2012年   340篇
  2011年   340篇
  2010年   412篇
  2009年   367篇
  2008年   373篇
  2007年   469篇
  2006年   509篇
  2005年   282篇
  2004年   94篇
  2003年   71篇
  2002年   49篇
  2001年   93篇
  2000年   64篇
  1999年   33篇
  1998年   41篇
  1997年   28篇
  1996年   37篇
  1995年   11篇
  1994年   13篇
  1993年   18篇
  1992年   14篇
  1991年   11篇
  1990年   11篇
  1989年   11篇
  1988年   10篇
  1985年   2篇
排序方式: 共有4699条查询结果,搜索用时 22 毫秒
871.
采用因子分析将公路运输枢纽载体城市的14项统计指标简化为3类综合因子,构建Koho-nen网络模型并输入综合因子变量得到公路运输枢纽的初步分类方案,通过F-统计量检验分类效果发现将所选44个公路运输枢纽分为4类最佳.结果表明,因子分析与Kohonen网络结合是一种有效的公路运输枢纽分类方法,公路运输枢纽具有较明显的4个层级结构.  相似文献   
872.
Various flexible mechanisms related to quality of service (QoS) provisioning have been specified for uplink traffic at the medium access control (MAC) layer in the IEEE 802.16 standards. Among the mechanisms, contention based bandwidth request scheme can be used to indicate bandwidth demands to the base station for the non-real-time polling and best-effort services. These two services are used for most applications with unknown traffic characteristics. Due to the diverse QoS requirements of those applications, service differentiation (SD) is anticipated over the contention based bandwidth request scheme. In this paper we investigate the SD with the bandwidth request scheme by means of assigning different channel access parameters and bandwidth allocation priorities at different packets arrival probability. The effectiveness of the differentiation schemes is evaluated by simulations. It is observed that the initial backoff window can be efficient in SD, and if combined with the bandwidth allocation priority, the SD performances will be better. Foundation item: the National Basic Research Program (973) of China (No. 2005C13321804)  相似文献   
873.
We describe a batch RSA digital signature scheme in which a signer can sign messages for multiple recipients simultaneously. The construction is quite efficient due to the batch signing method. This is useful to improve the performance of a high-loaded signing server, for example a secure electronic transaction (SET) gateway. Theoretical calculations and experimental results show that the proposed scheme can improve the performance of the signing server significantly. Foundation item: the National Basic Research Program (973) of China (No. 2005CB321804)  相似文献   
874.
Steel wire wound reinforced flexible pipe in this study mainly consists of multiple anisotropic steel wire wound reinforcement layers and multiple isotropic rubber layers. Based on 3D anisotropic elastic theory, the analytic solutions of stresses and elastic deformations of steel wire wound reinforced rubber flexible pipe under internal pressure are presented. As the adjacent reinforcement layers with wound angle have different radii, the single reinforcement layer shows the effect of tensile-shear coupling. Moreover, the static loading test results of steel wire wound reinforced rubber flexible pipe under internal pressure are basically coincided with the calculated values by present method.  相似文献   
875.
In this paper, we study an area localization problem in large scale underwater wireless sensor networks (UWSNs). The limited bandwidth, the severely impaired channel and the cost of underwater equipment all make the underwater localization problem very challenging. Exact localization is very difficult for UWSNs in deep underwater environment. We propose a range free method based on mobile detachable elevator transceiver (DET) and 3D multi-power area localization scheme (3D-MALS) to address the challenging problem. In the proposed scheme, the ideas of 2D multi-power area localization scheme (2D-ALS) and utilizing DET are used to achieve the simplicity, location accuracy, scalability and low cost performances. The DET can rise and get down to broadcast its position. And it is assumed that all the underwater nodes underwater have pressure sensors and know their z coordinates. We evaluate the performances of 2D-ALS and our proposed 3D-MALS schemes under both ideal and non-ideal channel propagation conditions, in terms of localization error and localization ratio. The simulation results show that our proposed scheme is much more efficient than the 2D-ALS.  相似文献   
876.
A computer-aided method to design a hybrid layout—tree-shape planar flowlines is presented. In newtype flowshop layout, the common machines shared by several flowlines could be located together in functional sections. The approach combines traditional cell formation techniques with sequence alignment algorithms. Firstly, a sequence analysis based cell formation procedure is adopted; then the operation sequences for parts are aligned to maximize machines adjacency in hyperedge representations; finally a tree-shape planar flowline will be obtained for each part family. With the help of a sample of operation sequences obtained from industry, this algorithm is illustrated.  相似文献   
877.
A novel algorithm to voxelize 3D mesh models with gray levels is presented in this paper. The key innovation of our method is to decide the gray level of a voxel according to the total area of all surfaces contained by it. During the preprocessing stage, a set of voxels in the extended bounding box of each triangle is established. Then we travel each triangle and compute the areas between it and its set of voxels one by one. Finally, each voxel is arranged a discrete gray level from 0 to 255. Experiments show that our algorithm gets a comparatively perfect result compared with the prevenient ones and approaches the original models in a more accurate way.  相似文献   
878.
Mobile ad hoc networks are often deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DoS) attacks launched through compromised nodes or intruders. In this paper, we investigated the effects of flooding attacks in network simulation 2 (NS-2) and measured the packet delivery ratio and packet delay under different flooding frequencies and different numbers of attack nodes. Simulation results show that with the increase the flooding frequencies and the numbers of attack nodes, network performance drops. But when the frequency of flooding attacks is greater than a value, the performance decrease gets smooth. Meanwhile the packet delay firstly increases and then declines to a value of stability at the end.  相似文献   
879.
结合某车型制动踏板支架的逆向设计,介绍了基于曲面特征的建模策略和方法,详细分析了扫掠面和旋转面的重构方法,以及逆向设计建模过程中特征曲线提取的方法与技巧.  相似文献   
880.
基于直接横摆力矩控制方法,设计了一种前馈一反馈补偿控制的车辆稳定性控制器.其中控制器以4WS为期望的车辆模型,通过前馈补偿控制可使车辆的质心侧偏角趋于理想值,而反馈补偿控制可使车辆模型在较好地跟踪理想模型的基础上,有效抵抗外界干扰.通过前轮角阶跃输入与正弦输入仿真,就控制效果的稳定性与对前轮转角的跟随特性两方面而言,所设计的控制系统能较好地控制车辆的操纵稳定性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号