首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1981篇
  免费   6篇
公路运输   207篇
综合类   662篇
水路运输   680篇
铁路运输   5篇
综合运输   433篇
  2022年   5篇
  2021年   8篇
  2020年   8篇
  2019年   13篇
  2018年   335篇
  2017年   296篇
  2016年   254篇
  2015年   7篇
  2014年   10篇
  2013年   17篇
  2012年   65篇
  2011年   207篇
  2010年   220篇
  2009年   50篇
  2008年   178篇
  2007年   124篇
  2005年   52篇
  2004年   43篇
  2003年   60篇
  2002年   18篇
  2001年   4篇
  2000年   1篇
  1999年   1篇
  1994年   2篇
  1992年   1篇
  1990年   1篇
  1985年   1篇
  1983年   1篇
  1981年   1篇
  1979年   1篇
  1977年   1篇
  1974年   2篇
排序方式: 共有1987条查询结果,搜索用时 15 毫秒
141.
Radar target signals and chaff cloud jamming signals have different characters by the wavelet transform. The wavelet coefficients of radar target signals are highly correlated with its near-and-near-scale wavelet coefficients, however the correlativity between the wavelet coefficients of chaff cloud jamming signals and its near-and-near scale wavelet coefficients is less significant. Based on the binary-base discrete wavelet transform and the correlation algorithm, the method of target entropy to estimate standard variance of the jamming signals and each scale is proposed to ensure reasonable threshold, to suppress chaff cloud signals and finally to reconstruct mixed signals by the improved spatially selective noise filtration (ISSNF) method. The extensive simulation results show that the proposed method can availably suppress chaff cloud jamming and decontaminate target echo.  相似文献   
142.
This article discusses the enforcement of shipping standards, with a particular focus on Part XII of UNCLOS. Section 6 of Part XII contains the only comprehensive set of vessel-related enforcement provisions in the Convention, but the Part’s scope is limited to “the preservation and protection of the marine environment.” Therefore, not all shipping standards fall clearly within Part XII’s ambit, including those centered on safety, security, and crewing considerations. The enforcement provisions of Section 6 are favorable to flag states and their vessels, and Section 7 contains a number of safeguards for their benefit, so it is in the interests of these parties to have coastal state enforcement governed by Part XII. However, the ability of coastal states to establish and enforce shipping standards that apply within the territorial sea extends to more than just environmental matters. The result is that different standards give rise to different enforcement powers, depending on the maritime zone in which a vessel is located, even if those standards arise from the same international agreement. It is suggested that to remedy these problems, UNCLOS would need to be amended in order to provide a comprehensive enforcement regime for the enforcement of shipping standards.  相似文献   
143.
A novel method toward color image segmentation is proposed based on edge linking and region grouping. Firstly, the edges extracted by the Canny detector are linked to form regions. Each of the end points of edges is connected by a direct line to the nearest pixel on another edge segment within a sub-window. A new distance is defined based on the feature that the edge tends to preserve its original direction. By sampling the lines to the image, the image is over-segmented to labeled regions. Secondly, the labeled regions are grouped both locally and globally. A decision tree is constructed to decide the importance of properties that affect the merging procedure. Finally, the result is refined by user’s selection of regions that compose the desired object. Experiments show that the method can effectively segment the object and is much faster than the state-of-the-art color image segmentation methods.  相似文献   
144.
Democratic group signature (DGS) is a group-oriented primitive with great flexibilities, i.e., no group manager, anonymity, and traceability. In a DGS scheme with (t, n)-threshold traceability, any subset of not less than t members can jointly reveal the identity of the signer while preserving security even in the presence of an active adversary can corrupt up to t − 1 group members. This paper proposes an efficient DGS scheme. We use publicly verifiable secret sharing (PVSS) to distribute the trapdoor via which the real signer is revealed. The computation cost and communication overhead of our DGS signatures are greatly reduced, compared with the existing work. For example, the size of the resulting signature contains only 2n + 1 elements of Z q , except the PVSS output.  相似文献   
145.
This paper examines the out-of-home, weekend, time-use patterns of children aged 5–17 years, with a specific emphasis on their physical activity participation. The impact of several types of factors, including individual and household demographics, neighborhood demographics, built environment characteristics, and activity day variables, on physical activity participation is analyzed using a joint nested multiple discrete–continuous extreme value-binary choice model. The sample for analysis is drawn from the 2000 San Francisco Bay Area Travel Survey. The model developed in the paper can be used to assess the impacts of changing demographics and built environment characteristics on children’s physical activity levels.  相似文献   
146.
Observing the rhythms of daily life: A six-week travel diary   总被引:2,自引:0,他引:2  
  相似文献   
147.
Nonlinear ACC in Simulation and Measurement   总被引:2,自引:0,他引:2  
In this paper an adaptive cruise control (ACC) of a convoy consisting of two passenger cars is designed and tested. For the ACC only on board sensors in the following vehicle are used, communication within the convoy or between the controlled vehicle and electronic systems on the roadside is not assumed. A laser scanner is applied for range measurements, derived from the complete vision data of the area in front of the car. Since the scanner provides the range only, a Kalman Filter is used to estimate the velocity and acceleration of the car. For controller design the concept of flat outputs in connection with the exact state linearization is applied. Moreover, the exact state linearization is combined with a sliding mode control. The control parameters are obtained by an optimization algorithm using optimal tracking formulation. The optimization also guarantees individual vehicle stability as well as string stability of the convoy. It is shown how the convoy is responding to disturbances resulting from initial errors or from velocity steps by the leading vehicle at lower speed in simulation and experiment.  相似文献   
148.
Realistic simulation of underwater scene is always difficult because of the special and complex vision effects in underwater space. Seabed is an important part of underwater environment. This paper describes the methods for seabed scene simulation based on OpenGL. It includes construction of fluetuant terrain based on the random sinusoidal algorithm, simulation of seabed flicker effect by means of circular texture mapping and generation of turbidity effect by using fog techniques. For the application based on the leading high level 3D development environment-Vega, underwater scene simulation is still a difficulty since there is no module for it. Based on the analysis of Vega software and the research on seabed scene simulation methods, a Vega extending module named “Underwater Space” was created through developing module class and extending lynx interface. The module class was designed through developing DLL written in C . The Lynx was extended through developing keyword configure file, GUI configure file and lynx plug-in DLL. The problem that Vega can‘t simulate underwater space, is elementarily resolved. The results show that this module is efficient, easy using, and the seabed scene images am vivid.  相似文献   
149.
150.
For the applied limitation of the existing threshold decryption schemes based on the (t, n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares. The generation and distribution of private key shares, the encryption, the decryption and the combination are introduced in detail. The validity and security of the scheme are proved and analyzed. Comparisons with the existing schemes show that the proposed scheme is more flexible.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号