首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4367篇
  免费   28篇
公路运输   1224篇
综合类   750篇
水路运输   1323篇
铁路运输   81篇
综合运输   1017篇
  2023年   17篇
  2022年   53篇
  2021年   23篇
  2020年   19篇
  2019年   24篇
  2018年   386篇
  2017年   363篇
  2016年   392篇
  2015年   38篇
  2014年   110篇
  2013年   331篇
  2012年   204篇
  2011年   376篇
  2010年   369篇
  2009年   181篇
  2008年   309篇
  2007年   184篇
  2006年   51篇
  2005年   107篇
  2004年   77篇
  2003年   95篇
  2002年   61篇
  2001年   37篇
  2000年   45篇
  1999年   34篇
  1998年   32篇
  1997年   37篇
  1996年   38篇
  1995年   55篇
  1994年   17篇
  1993年   32篇
  1992年   19篇
  1991年   19篇
  1990年   11篇
  1989年   8篇
  1988年   10篇
  1987年   16篇
  1986年   16篇
  1985年   14篇
  1984年   19篇
  1983年   18篇
  1982年   10篇
  1981年   18篇
  1980年   18篇
  1979年   19篇
  1978年   11篇
  1977年   16篇
  1976年   13篇
  1975年   21篇
  1974年   11篇
排序方式: 共有4395条查询结果,搜索用时 15 毫秒
961.
A comprehensive study was presented for WLAN 802.11b using error-prone channel. It was theoretically and numerically evaluated the performance of three different network sizes with the bit rates that available in 802.11b protocol. Results show that throughput does not change with the size of the network for wide range of bit error rates (BERs) and the channel bit rates play a significant role in the main characteristics of the network. A comprehensive explanation has given for the phenomenon of the packet delay suppression at relatively high level of BERs in view of the size of the networks and the BERs. The effect length of the transmitting packets is also investigated.  相似文献   
962.
Aiming to the puzzle that the inner load of nonlinear synthesis transmission system is difficult to obtain, a new kind of virtual prototype establishment and simulation method is put forward. The influence on nonlinear vibration with flexible rotor, bearing backlash is analyzed based on a virtual prototype. To validate the virtual prototype of nonlinear gear transmission system, the corresponding test platform is established. The consistency between simulation results and test results proves that the simulation results of the virtual prototype can be used to calculate the fatigue reliability life of key components. A new kind of fatigue reliability life prediction method of gear system considering multi-random parameter distribution is put forward based on the fatiguestatistic theory. Considering the periodicity of gear meshing, linear interpolation method is adopted to obtain the stress-time course of random load spectrum based on the gear’s complicated torque provided by virtual prototype. The gear’s P-Sa-Sm-N curved cluster can be simulated based on material’s P-S-N curve. The simulation process considers the parameter distributions of stress concentration coefficients, dimension coefficients and surface quality treatment coefficients, and settles the puzzle that traditional test methods cannot acquire the gear’s fatigue life of all reliability levels. This method can provide the distribution function and the interval of fatigue reliability life of gear’s danger region, and has a guide meaning for the gear maintenance periods determination and reliability evaluation.  相似文献   
963.
EXPRESSION CLONING OF A PROTECTIVE LEISHMANIA ANTIGEN   总被引:5,自引:0,他引:5  
EXPRESSIONCLONINGOFAPROTECTIVELEISHMANIAANTIGENE.Mougneau,F.Altars,A.E.Wakil,ZhengShichun;T.Coppola,Z.Wang,R.Waldmann,R.M.Loc...  相似文献   
964.
目的 进一步探讨植物性雌激素和内源性雌激素对雌性自发性高血压鼠 (SHR)的盐敏感高血压反应的保护作用。方法 对三周龄雌性SHR行卵巢切除术 ,饲以 0 .1mol·L- 1 或 1 .4mol·L- 1 NaCl,含或不含植物性雌激素之食物。 1 0周龄时 ,腹主动脉内植入遥测传感器 ,用“计算机腹主动脉血压遥测系统”2 4h连续测量血压、心率及整体活动。静脉注射六甲双铵阻断交感神经系统活动后 ,记录动脉压和心率反应。结果 食用无论是否富含植物性雌激素的高盐食物 ,动脉血压都明显增高 ,不含植物性雌激素组更甚。交感神经系统活动阻断后 ,引起所有各组鼠夜间动脉压急剧降低。结论 食物中所含之植物性雌激素可降低雌性SHR的盐敏感高血压反应。交感神经系统兴奋性异常在高盐食物引起的血压增高中起重要作用  相似文献   
965.
The ability of dynamic contrast enhanced magnetic resonance imaging(DCE MRI) with a new devised animal surface coil was analyzed in identifying atherosclerotic plaques in the rabbit medium-sized iliac artery(IA).Then a comparative analysis of multi-detector computed tomography(MDCT) and DCE MRI was done in discerning morphology and components of 80 atherosclerotic plaques identified by histopathology.It shows that the DCE MRI may be an emerging noninvasive and economic way to characterize atherosclerotic plaques at present.What's more, a new devised animal surface coil would further improve the signal-to-noise ratio(SNR) and the quality of imaging.However, CT angiography(CTA) may be better than MR angiography(MRA) in detecting vessel stenosis.  相似文献   
966.
Hepatic computed tomography(CT) images with Gabor function were analyzed.Then a threshold-based classification scheme was proposed using Gabor features and proceeded with the retrieval of the hepatic CT images.In our experiments, a batch of hepatic CT images containing several types of CT findings was used and compared with the Zhao's image classification scheme, support vector machines(SVM) scheme and threshold-based scheme.  相似文献   
967.
Granular effect of fly ash repairs damage of recycled coarse aggregate   总被引:1,自引:0,他引:1  
Repairing effect of fly ash (FA) on damage of recycled coarse aggregate was evaluated by characteristics of pores and cracks in the vicinity of interracial transition zone (ITZ). The interracial structure between the virgin aggregate and the attached old mortar was investigated and compared with ITZ of recycled aggregate concrete in the presence of FA or ultra-fine FA(UFA) by means of scanning electron microscope (SEM). Diam- eter and plumpness frequency distribution of pores as well as width of the old ITZ, length of contacting points and cracks density were analyzed. The SEM results reveal that the diameter of pores is decreases significantly but pores plumpness increases. A decreased ITZ width and cracks density as well as an increased bonding zone length can also been observed, which indicates that FA or UFA repairs damage of recycled coarse aggregate due to its granular effect.  相似文献   
968.
An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, both of which make an exchange protocol more practical. The scheme is unconditionally secure against the cheating signer, its security against the cheating verifier is reduced to the computational Diffie-Hellman (CDH) problem in the underlying group, it is secure against the cheating trusted third party if the underlying Paterson Schuldt's identity based signature (IBS) scheme is secure, which is proven true based on the CDH assumption in the standard model.  相似文献   
969.
Applications on iterative control and multiple input multiple output (MIMO) system were developed. Two new charts derived from extrinsic information transfer (EXIT) chart were employed as the designing tools, which are called as output mutual information chart with defined iterative degree (DID) chart and near optimum output mutual information (NOMI) chart respectively. Different from the EXIT chart, they can show the iterative performance on the whole signal-to-noise ratio range with one single curve, whereas computation complexity is greatly reduced compared with conventional bit error ratio (BER) performance curve. The iterative control was implemented according to a near-optimum iterative degree vector determined by NOMI chart, the reasonability of uncertain parameters was analyzed in one MIMO system. The concepts were illustrated based on bit-interleaved coded modulation with iterative decoding (BICM-ID).  相似文献   
970.
Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworthiness that is based on the knowledge related to the peer's identity, while identity privacy is usually achieved by hiding such knowledge. A trust model based on trusted computing (TC) technology was proposed to enhance the identity privacy of peers during the trustworthiness evaluation process between peers from different groups. The simulation results show that, the model can be implemented in an efficient way, and when the degree of anonymity within group (DAWG) is up to 0.6 and the percentage of malicious peers is up to 70%7 the service selection failure rate is less than 0.15.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号