首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2831篇
  免费   23篇
公路运输   526篇
综合类   883篇
水路运输   874篇
铁路运输   168篇
综合运输   403篇
  2024年   2篇
  2023年   2篇
  2022年   18篇
  2021年   33篇
  2020年   25篇
  2019年   5篇
  2018年   343篇
  2017年   294篇
  2016年   251篇
  2015年   21篇
  2014年   37篇
  2013年   39篇
  2012年   116篇
  2011年   264篇
  2010年   273篇
  2009年   135篇
  2008年   255篇
  2007年   235篇
  2006年   129篇
  2005年   112篇
  2004年   60篇
  2003年   73篇
  2002年   35篇
  2001年   16篇
  2000年   17篇
  1999年   15篇
  1998年   6篇
  1997年   5篇
  1996年   10篇
  1995年   5篇
  1994年   1篇
  1993年   3篇
  1992年   1篇
  1991年   8篇
  1990年   4篇
  1989年   2篇
  1987年   1篇
  1986年   2篇
  1984年   1篇
排序方式: 共有2854条查询结果,搜索用时 15 毫秒
131.
加强英语背景知识的学习不仅对学生的学业有积极帮助,而且对全面提高学生素质、培养良好的道德风尚也会起到潜移默化的作用,英语背景知识的学习应引起足够的重视.  相似文献   
132.
In the connected vehicles, connecting interfaces bring threats to the vehicles and they can be hacked to impact the vehicles and drivers. Compared with traditional vehicles, connected vehicles require more information transfer. Sensor signals and critical data must be protected to ensure the cyber security of connected vehicles. The communications among ECUs, sensors, and gateways are connected by in-vehicle networks. This paper discussed the state-of-art techniques about secure communication for in-vehicle networks. First, the related concepts in automotive secure communication have been provided. Then we have compared and contrasted existing approaches for secure communication. We have analyzed the advantages/disadvantages of MAC and digital signatures for message authentication and compared the performance and limitations of different cryptographic algorithms. Firewall and intrusion detection system are introduced to protect the networks. The constraints and features of different intrusion detection approaches are presented. After that, the technical requirements for cryptographic mechanism and intrusion detection policy are concluded. Based on the review of current researches, the future development directions of the automotive network security have been discussed. The purpose of this paper is to review current techniques on automotive secure communication and suggest suitable secure approaches to implement on the in-vehicle networks.  相似文献   
133.
根据某销售公司在2016年12月~2017年4月收到F汽车公司生产的乘用车用户反馈车内异味问题进行研究,以期找到气味物质主要来源,从而为源头控制、过程改进与末端治理相结合的车内空气质量综合管控体系的建立提供参考价值;主要方法为结合重点内饰件的主要用材和生产工艺,探究整车VOC超标原因;研究结果表明,车内乙醛超标主要是顶棚及座椅引起的,甲苯超标则是顶棚及密封条引起。对相关零部件进行管控,并对供应商提出有效的整改意见,为整车生产商提供整改依据。  相似文献   
134.
It has always been a daunting task for any government to allocate the budgets for public infrastructure effectively so as to maximize the benefits of the limited resources. The most important contribution this paper makes is to conduct an empirical study of the budget allocations of the six region-based road system construction plans in northern Taiwan using the transportation budget allocation model devised in this paper. After reviewing the results, the experts consulted while preparing this paper believe that these results are both objective and able to meet the actual requirements. The competent authority also believes that they are better than those obtained using their original approach. In particular, the construction of this model takes into consideration the highest-level supervisors. To a certain degree, it caters for the practices in budget allocation so that the managers are able to assume the authority corresponding to their responsibility concerning management efficiency and final outcomes.  相似文献   
135.
The objective of this study was to investigate the performance of a model azimuthing podded propulsor in ice-covered water. Model tests were carried out with two different depths of cut into the ice (15 and 35 mm), two different ice conditions (presawn and pack ice conditions), and four different azimuthing angles. The depth of cut is the maximum penetration depth of the propeller blade into the ice block. The 0.3-m-diameter model propeller was operated in a continuous ice milling condition. Ice loads were measured by several sensors which were installed in various positions on the model. Six one-axis pancake-style load cells on the top of the model measured the global loads and two six-component dynamometers were installed on the shaft to measure the shaft loads. One six-component dynamometer was attached to the one of the propeller blades inside the hub to measure the blade loads. The pod unit and propeller performance in ice are presented. Ice-related loads, which were obtained when the blade was inside the ice block, are introduced and discussed. During the propeller–ice interaction, a blade can experience the path generated by the previous blade, which is called the shadowing effect. The effects of shadowing, depth of cut, azimuthing angle, and advance coefficient on propulsor performance are presented and discussed.  相似文献   
136.
This paper presents a discussion of the characteristics of ship waves in a narrow channel restricted by vertical walls, based on observed data and the results computed by a 2-D model. In the numerical model, the propagation of waves generated by a moving ship is simulated by solving 2-D depth-integrated Boussinesq equations. To get the boundary conditions at the location of the ship, the slender-ship approximation is employed. A field observation was carried out at a straight length of navigation channel. The ships targeted in the observations are two kinds of waterbuses with lengths of 28 and 24 m. The relative depth Froude number for the river current, an appropriate parameter for assessing the influence of the current on ship wave characteristics in a navigation channel, ranged from 0.47 to 0.76. The observed maximum wave height varied between 0.13 and 1.26 m. The maximum wave height of the wave train is sharply increased when the relative depth Froude number exceeds 0.6. The results computed by the present model agree fairly well with the observed data.  相似文献   
137.
主动声纳的低截获性数字仿真研究   总被引:1,自引:0,他引:1  
在现代海战中,舰艇面临着越来越严峻的敌方侦察声纳的威胁.低截获是一项非常诱人的技术.低截获声纳通过选择合适的发射信号,在保持探测能力的同时,降低被敌方侦察声纳截获的概率.采用数字仿真的形式,分析浅海侦察声纳信号能量的变化,研究主动声纳的低截获性.仿真结果表明在高斯噪声背景下,主动声纳实现低截获性相当困难.  相似文献   
138.
This paper provides an analysis of trip generation of three vulnerable groups: single-parent families, low income households, and the elderly. It compares the mobility of these groups to that of the general population in three Canadian urban areas of Hamilton, Montreal and Toronto, based on data from large-sample metropolitan transport surveys. An ordered probit model with spatially expanded coefficients is used for the analysis. Spatial expansion shows that there are spatial mobility trends for elderly populations and low-income populations even after socio-economic attributes are accounted for. Such spatial differences are not generally found for single parent families. This novel spatial analysis provides clues as to where vulnerable populations may experience greater degrees of social exclusion. It provides information to help prioritize transportation infrastructure projects or other social programs to take into account the needs of vulnerable populations with the lowest levels of mobility.  相似文献   
139.
基于SPH方法的波浪对水平板冲击的数值模拟(英文)   总被引:1,自引:0,他引:1  
A numerical model was established for simulating wave impact on a horizontal deck by an improved incompressible smoothed particle hydrodynamics (ISPH). As a grid-less particle method, the ISPH method has been widely used in the free-surface hydrodynamic flows with good accuracy. The improvement includes the employment of a corrective function for enhancement of angular momentum conservation in a particle-based calculation and a new estimation method to predict the pressure on the horizontal deck. The simulation results show a good agreement with the experiment. The present numerical model can be used to study wave impact load on the horizontal deck.  相似文献   
140.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号