全文获取类型
收费全文 | 2244篇 |
免费 | 6篇 |
专业分类
公路运输 | 279篇 |
综合类 | 798篇 |
水路运输 | 721篇 |
铁路运输 | 83篇 |
综合运输 | 369篇 |
出版年
2022年 | 7篇 |
2021年 | 8篇 |
2020年 | 10篇 |
2019年 | 3篇 |
2018年 | 338篇 |
2017年 | 295篇 |
2016年 | 252篇 |
2015年 | 18篇 |
2014年 | 10篇 |
2013年 | 18篇 |
2012年 | 75篇 |
2011年 | 227篇 |
2010年 | 233篇 |
2009年 | 85篇 |
2008年 | 204篇 |
2007年 | 145篇 |
2006年 | 44篇 |
2005年 | 79篇 |
2004年 | 52篇 |
2003年 | 67篇 |
2002年 | 26篇 |
2001年 | 5篇 |
2000年 | 12篇 |
1999年 | 6篇 |
1998年 | 5篇 |
1997年 | 4篇 |
1996年 | 2篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1987年 | 2篇 |
1986年 | 2篇 |
排序方式: 共有2250条查询结果,搜索用时 765 毫秒
211.
Distributed information systems require complex access control which depends upon attributes of protected data and access
policies. Traditionally, to enforce the access control, a file server is used to store all data and act as a reference to
check the user. Apparently, the drawback of this system is that the security is based on the file server and the data are
stored in plaintext. Attribute-based encryption (ABE) is introduced first by Sahai and Waters and can enable an access control
mechanism over encrypted data by specifying the users’ attributes. According to this mechanism, even though the file server
is compromised, we can still keep the security of the data. Besides the access control, user may be deprived of the ability
in some situation, for example paying TV. More previous ABE constructions are proven secure in the selective model of security
that attacker must announce the target he intends to attack before seeing the public parameters. And few of previous ABE constructions
realize revocation of the users’ key. This paper presents an ABE scheme that supports revocation and has full security in
adaptive model. We adapt the dual system encryption technique recently introduced by Waters to ABE to realize full security. 相似文献
212.
Aiming at the problem that the fast tracking algorithm using spatio-temporal context (STC) will inevitably lead to drift and even lose the target in long-term tracking, a new algorithm based on spatio-temporal context that integrates long-term tracking with detecting is proposed in this paper. We track the target by the fast tracking algorithm, and the cascaded search strategy is introduced to the detecting part to relocate the target if the fast tracking fails. To a large extent, the proposed algorithm effectively improves the accuracy and stability of long-term tracking. Extensive experimental results on benchmark datasets show that the proposed algorithm can accurately track and relocate the target though the target is partially or completely occluded or reappears after being out of the scene. 相似文献
213.
214.
Circuit net list bipartitioning using simulated annealing technique has been proposed in the paper. The method converges asymptotically
and probabilistically to global optimization. The circuit net list is partitioned into two partitions such that the number
of interconnections between the partitions is minimized. The proposed method begins with an innovative clustering technique
to obtain a good initial solution. Results obtained show the versatility of the proposed method in solving non polynomial
hard problems of circuit net list partitioning and show an improvement over those available in literature. 相似文献
215.
In a coil box between the roughing and finishing stands on a hot strip mill, a problem has been encountered that the entry
region of the plate touches the bending rolls and deforms. As a result, the defective coil occurs. The condition of plate
bending, which forms a new deformation feature in coiling, is analyzed. In this paper, the authors focus on the research of
the effects of coiling parameters, such as the thickness of plate, roll speed and feeding speed of plate in coil box, and
on specific plate bending. A finite element method is developed to simulate this coiling process. Based on numerical simulation,
the effects of the coiling parameters on the mechanics and deformation of the bending plate are obtained. Numerical simulation
tests have verified the validity of the developed model. 相似文献
216.
A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the
range of a specified reader so that an off-line verifier can verify the proofs later. This proof has found several interesting
applications. However, many existing RFID yoking schemes are vulnerable to replay attacks. To overcome the weaknesses, Cho
et al. proposed a new RFID yoking proof protocol and a new grouping protocol. Unfortunately, Cho et al.’s schemes are still
vulnerable to replay attacks. In this paper, in addition to demonstrating weaknesses, we further discuss the rationale behind
these weaknesses to provide a guide line for designing secure RFID yoking schemes. Based on the guide line, we propose a new
RFID yoking scheme and a new RFID grouping scheme. Performance evaluation shows that our scheme outperforms its counterparts. 相似文献
217.
Zbigniew Gronostajski Marek Hawryluk Marcin Kaszuba Paweł Widomski Jacek Ziemba 《International Journal of Automotive Technology》2017,18(4):653-662
This study is focused on tools used in the industrial hot forging process of a front wheel forging (eventually–gear wheel) manufactured for the automotive industry. Four different variants were applied for the tools: 2 die inserts were coated with two different hybrid layers (GN + PVD type), i.e. AlCrTiN and AlCrTiSiN, one insert was only nitrided, and one was pad welded, to improve tool durability. The tool wear was analysed and represented by the material degradation on the working surface, based on the 3D scanning and the material growth of the periodically collected forgings. Additionally, the scanned tools were divided into two areas, in which it was found, based on the reliminary analysis, that various degradation mechanisms are predominant. Microstructural and hardness measurements of the analyzed tools were also performed. Based on the results, it was found that, in the central part of the die insert (area A), thermo-mechanical fatigue and wear occurred, while in the area of the bridge insert (area B), only abrasive wear could be observed. For these areas (A and B), the loss of material was determined separately. In area A for the inserts with hybrid layer GN+AlCrTiSiN and gas nitrided, an intensive increase of wear took place, which was not observed for the pad welded and GN+AlCrTiN layer insert, for which, together with the increase of the forging number, a proportional growth of the loss of material occurred. In area B the weakest results were obtained for the insert with GN+AlCrTiSiN layer, while wear of other die inserts grew similar and proportional. 相似文献
218.
Hydrostatic stresses of copper dual-damascene interconnects are calculated by a commercial finite element software in this
paper. The analytical work is performed to examine the effects of different low-k (k is permittivity) dielectrics, barrier layer and aspect ratio of via on hydrostatic stress distribution in the copper interconnects.
The results of calculation indicate that the hydrostatic stresses are highly non-uniform throughout the copper interconnects
and the highest tensile hydrostatic stress exists on the top interface of lower level interconnect near via. Both the high
coefficient of thermal expansion and the low elastic modulus of the low-k dielectrics and barrier layer can decrease the highest hydrostatic stress on the top interface, which can improve the reliability
of the copper interconnects. 相似文献
219.
都元是<汉书>地理志所载南海地名,屈都乾是魏晋时期出现的东南亚古地名,卡蒂加拉(Cattigara)是古希腊人托勒密<地理志>中所载东方地名.对于上述三地之方位,已有众多学者加以考订.都元之方位有越南中部说、越南南部说、泰国东南部说、泰国西南部说、马来半岛说、苏门答腊说、婆罗洲说、菲律宾说等多种主张;屈都乾同名异译有屈都昆、都昆、都军等,有学者认为屈都乾即都元、婚都,也有不同意此说,其方位之考订有老挝东南部说、越南南部说、泰国东南部说、泰国西南部说、马来半岛说、苏门答腊说等;[1]卡蒂加拉之考证有泰国东南部及柬埔寨沿海说、湄公河三角洲说、越南中部说、越南北部说等,[2]众说纷纭,莫衷一是.笔者经过多年研究后认为,都元、屈都乾及卡蒂加拉实为同一地名之不同音译,地在今泰国东南部. 相似文献
220.
论述了电气化铁路的功率因数与经济效益的关系,说明通过电力机车和牵引供电设备改造,改善牵引供电系统功率因数,可有效减少电费支出,提高电气化铁路技术经济效益,并提出了几项措施。 相似文献