首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   129篇
  免费   3篇
公路运输   9篇
综合类   29篇
水路运输   22篇
铁路运输   62篇
综合运输   10篇
  2023年   1篇
  2022年   1篇
  2021年   2篇
  2020年   2篇
  2019年   1篇
  2018年   1篇
  2017年   3篇
  2016年   2篇
  2015年   4篇
  2014年   7篇
  2013年   7篇
  2012年   11篇
  2011年   13篇
  2010年   14篇
  2009年   8篇
  2008年   8篇
  2007年   13篇
  2006年   14篇
  2005年   9篇
  2004年   4篇
  2003年   3篇
  2002年   1篇
  2001年   2篇
  1995年   1篇
排序方式: 共有132条查询结果,搜索用时 15 毫秒
111.
安全管理工作中应用科学管理方式的必要性,当前铁路运输安全管理方中的不足,高速发展的铁路客货运输应采用的科学管理方式。  相似文献   
112.
Freight transportation by railroads is an integral part of the U.S. economy. Identifying critical rail infrastructures can help stakeholders prioritize protection initiatives or add necessary redundancy to maximize rail network resiliency. The criticality of an infrastructure element, link or yard, is based on the increased cost (delay) incurred when that element is disrupted. An event of disruption can cause heavy congestion so that the capacity at links and yards should be considered when freight is re-routed. This paper proposes an optimization model for making-up and routing of trains in a disruptive situation to minimize the system-wide total cost, including classification time at yards and travel time along links. Train design optimization seeks to determine the optimal number of trains, their routes, and associated blocks, subject to various capacity and operational constraints at rail links and yards. An iterative heuristic algorithm is proposed to attack the computational burden for real-world networks. The solution algorithm considers the impact of volume on travel time in a congested or near-congested network. The proposed heuristics provide quality solutions with high speed, demonstrated by numerical experiments for small instances. A case study is conducted for the network of a major U.S. Class-I railroad based on publicly available data. The paper provides maps showing the criticality of infrastructure in the study area from the viewpoint of strategic planning.  相似文献   
113.
New technologies are constantly being researched and developed to improve the sense of security of transport users. However, security technologies could also pose their own risks with regard to transport users’ privacy through the potential for data collection and storage. Transport, in particular, allows the data collector potential access to information on the users’ habits through the location information that could be collected during an individual’s interaction with technology during their travels. Some technologies, such as personal security apps (which essentially turn a smartphone into a type of panic alarm) also allow for the linking of the security technology and social networking apps. Given this link and the extent to which personal data, including location data, can be included in an individual’s social networking account, it was decided to investigate if the use of social networks could be related to individuals’ opinions on the use of their data through new technologies, such as personal security apps. This paper presents an exploration of the possibility of grouping respondents to a transport survey (N = 469) based on their answers to questions on their social networking (SNS) use. It was hypothesised that if distinct groups exist within the SNS data, then they could be used as a supplementary personal variable for underlying privacy concerns and levels of engagement with technology in future transport studies. This would be in addition to the socio-demographic information collected in the survey. This paper presents the initial dimension reduction of the response variables to create composite variables. That is followed by the exploratory clustering of responses using two-step cluster analysis. Finally, the paper discusses the hypothesis testing of the resultant clusters against the socio-demographic responses to ascertain if additional information is provided by the clustering results. The transport survey responses were collected in Ireland, and a subset of responses, from the Greater Dublin Area, were used for the analysis in this paper. The results demonstrate that there is scope for this type of method to be used when researching new security technologies in transport.  相似文献   
114.
针对吉茶高速公路典型长大纵坡路段运营安全问题,通过对矮寨悬索桥明线方案与特长排碧隧道方案的路线方案比选,采取从地形条件、平面方案比选和纵面指标控制的研究来达到降低长大纵坡的平均坡度,均衡平纵指标的主动措施,以期达到项目安全、和谐的综合效益目标。  相似文献   
115.
李虹 《中国水运》2006,6(7):171-172
安全是航运企业的永恒主题。人们的安全理念、安全价值观和判断标准也发生了深刻的变革,以“关爱生命、关注安全”为主旨的全社会的安全文化,正在逐步形成。本文结合工作实际对建设企业的安全文化提出思考。  相似文献   
116.
针对微软Win2000 Server的网络特性和存在问题,就如何对网络服务器进行安全配置进行了描述,以便最大限度地保证服务器的安全。  相似文献   
117.
计算机联锁输入信息的安全性定义,是正确设计输入接口电路的基础。合理选择输入信息采集接点,是实现输入接口安全性和可靠性的重要保证。对于单点采集和双点采集两种方案进行了分析、比较。  相似文献   
118.
分析了ISPS规则和新的《海船船员适任考试大纲》对《船舶管理》课程的影响,就本课程在教学中应注意的问题进行了讨论。  相似文献   
119.
3G系统执行认证与密钥分配协议,在移动台和服务网络之间进行双向认证,在互相确认对方身份的基础上生成数据加密密钥CK和数据完整性密钥IK。3G安全体系的鉴权认证阶段是其薄弱环节,针对其缺陷,结合PKI技术,提出基于SSL握手协议的鉴权认证方案。在3G网络中加入认证中心及注册中心,用于验证用户身份、发放和恢复证书。针对无线终端特性,为服务器端使用的证书定义一个新的PKI证书格式———WTLS证书,并使用短时效证书SLC作为验证证书有效期的方案。该认证方案可以与3G现有安全模式并行,建议3G设置双模式认证方式来提高其安全强度。在无线终端侧实现了用户证书的存储管理,从而实现了加解密、数据完整性保护等各方面的功能,验证了基于SSL握手协议的鉴权认证方式是可行的。  相似文献   
120.
地铁信号系统工厂化施工研究   总被引:1,自引:0,他引:1  
通过对轨道交通建设特点、地铁信号系统发展的分析,为提高地铁信号系统的安全性、可用性和可靠性,提出信号系统室内工程采用工厂化施工。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号