全文获取类型
收费全文 | 2516篇 |
免费 | 86篇 |
专业分类
公路运输 | 679篇 |
综合类 | 709篇 |
水路运输 | 631篇 |
铁路运输 | 509篇 |
综合运输 | 74篇 |
出版年
2024年 | 3篇 |
2023年 | 19篇 |
2022年 | 65篇 |
2021年 | 85篇 |
2020年 | 85篇 |
2019年 | 34篇 |
2018年 | 34篇 |
2017年 | 37篇 |
2016年 | 38篇 |
2015年 | 92篇 |
2014年 | 111篇 |
2013年 | 136篇 |
2012年 | 180篇 |
2011年 | 158篇 |
2010年 | 191篇 |
2009年 | 188篇 |
2008年 | 200篇 |
2007年 | 251篇 |
2006年 | 203篇 |
2005年 | 155篇 |
2004年 | 61篇 |
2003年 | 44篇 |
2002年 | 48篇 |
2001年 | 51篇 |
2000年 | 37篇 |
1999年 | 30篇 |
1998年 | 18篇 |
1997年 | 4篇 |
1996年 | 10篇 |
1995年 | 13篇 |
1994年 | 3篇 |
1993年 | 5篇 |
1992年 | 4篇 |
1991年 | 1篇 |
1990年 | 5篇 |
1986年 | 2篇 |
1984年 | 1篇 |
排序方式: 共有2602条查询结果,搜索用时 234 毫秒
451.
This paper proposes an innovative supervision method that can provide project supervisors with real-time supervision of engineering projects and contractor activity. To obtain real-time and comprehensive state of project, we use grid management to divide the project supervision grid in three levels: stage, objective, and milestone. Then, a detailed supervision mechanism is designed to help supervisors measure the project situation in real time. This mechanism checks that if the project objectives (such as schedule, cost, quality, and safety) in every supervision grid cell are under the healthy limits, any project deviation can be identified as soon as possible. A schedule objective is selected as an example to illustrate the method used to calculate the healthy limit. 相似文献
452.
User authentication scheme allows user and server to authenticate each other, and generates a session key for the subsequent communication. How to resist the password guessing attacks and smart card stolen attacks are two key problems for designing smart cart and password based user authentication scheme. In 2011, Li and Lee proposed a new smart cart and password based user authentication scheme with smart card revocation, and claimed that their scheme could be immunity to these attacks. In this paper, we show that Li and Lee's sctleme is vulnerable to off-line password guessing attack once the information stored in smart card is extracted, and it does not provide perfect forward secrecy. A robust user authentication scheme with smart card revocation is then proposed. We use a most popular and widely used formal verification tool ProVerif, which is based on applied pi calculus, to prove that the proposed scheme achieves security and authentication. 相似文献
453.
采用与或树分析方法,结合算法的构造,推导出复制窗口不等保护算法中各类数据的译码失败概率迭代公式.从数学的角度验证算法性能.通过Matlab性能仿真,给出在不同复制因数下复制窗口不等保护算法与算法误比特率性能关系曲线.通过与基于权重的不等保护算法及拓展窗口喷泉码的渐进性能仿真结果进行对比,证明了该算法在相同译码开销下,可将保护级别提高3~4个数量级.此外,本文研究了复制因数对算法性能的影响,在不同的译码开销下,通过Matlab仿真给出复制因数与算法性能的关系曲线. 相似文献
454.
在分析公路工程机械中沥青供给系统的结构和工作原理的基础上,对沥青计量和供给系统方案、计量斗设计、沥青泵选择、管路和法兰设计进行探讨,确定在一定工况下阀、管子、液位传感器和沥青泵等的参数,提出沥青供给系统改进方法,希望能对今后公路工程机械发展起到一定的帮助. 相似文献
455.
456.
457.
458.
Different from western markets, the margin rates in Chinese futures markets are raised when contract approaches maturity. This paper concentrates on the effect of this time dependent margin rule on volatility. Open interest, another candidate in the margin rule, is also included in our model to investigate its necessity as one of the factors of the rise of margin rates. With the popular copper contract in Shanghai Futures Exchange (SHFE) , our test results suggest that margin levels have a significant positive effect on volatility, yet open interest has little to do with volatility. The implication is that the rise of margin rate approaching maturity virtually deteriorates the degree of market risks, and open interest is not a necessary factor for the margin rule. It indicates that the policy tool, represented by margin rates, has significantly greater influence on volatility than the market element, represented by open interest. 相似文献
459.
汽车ECU散热器的动态性能直接决定了ECU各个部件的工作稳定性,对电控单元散热器进行动态特性分析是保证汽车可靠性的主要技术手段.采用频率多参考模态拟合方法进行了模态试验,获得了散热器的3阶模态参数.根据ANSYS软件计算的模态参数与试验模态参数的比较结果,通过改变有限元几何模型形式和提高单元阶次等方法,修正有限元模型及其边界条件,最终达到模态频率的计算值与实验值最大相对误差为2.4%.获取的散热器模态参数.为汽车ECU散热器动态性能的优化提供了依据和参考. 相似文献
460.
Temporal key integrity protocol (TKIP) is a sub-protocol of IEEE 802.11i. TKIP remedies some security flaws in wired equivalent privacy (WEP) protocol. TKIP adds four new algorithms to WEP: a message integrity code (MIC) called Michael, an initialization vector (IV) sequencing discipline, a key mixing function and a re-keying mechanism. The key mixing function, also called temporal key hash, de-correlates the IVs from weak keys. Some cryptographic properties of the substitution box (S-box) used in the key mixing function are investigated in this paper, such as regularity, avalanche effect, differ uniform and linear structure. Moen et al pointed out that there existed a temporal key recovery attack in TKIP key mixing function. In this paper a method is proposed to defend against the attack, and the resulting effect on performance is discussed. 相似文献