首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5552篇
  免费   283篇
公路运输   1019篇
综合类   2120篇
水路运输   1345篇
铁路运输   1067篇
综合运输   284篇
  2024年   28篇
  2023年   69篇
  2022年   121篇
  2021年   164篇
  2020年   188篇
  2019年   144篇
  2018年   109篇
  2017年   230篇
  2016年   217篇
  2015年   287篇
  2014年   187篇
  2013年   242篇
  2012年   357篇
  2011年   454篇
  2010年   224篇
  2009年   263篇
  2008年   476篇
  2007年   450篇
  2006年   446篇
  2005年   301篇
  2004年   239篇
  2003年   141篇
  2002年   94篇
  2001年   69篇
  2000年   58篇
  1999年   54篇
  1998年   39篇
  1997年   49篇
  1996年   22篇
  1995年   22篇
  1994年   22篇
  1993年   19篇
  1992年   13篇
  1991年   8篇
  1990年   9篇
  1989年   10篇
  1988年   7篇
  1987年   3篇
排序方式: 共有5835条查询结果,搜索用时 31 毫秒
991.
康有为  孙丽萍  康庄 《船舶工程》2014,36(6):117-121
外输系统在深水油田开发中得到了广泛应用,而其中输油管的疲劳问题是外输系统设计分析的关键。针对西非深水海域外输系统中的输油管展开疲劳特性分析,基于典型西非海况下外输系统整体时域耦合分析结果,对输油管时域应力曲线采用雨流计数法进行分析,然后根据合适的S-N曲线和Miner线性准则对输油管进行疲劳损伤计算。分析内容包括西非海域不同的环境条件对输油管疲劳的作用,穿梭油轮系泊情况下输油管的疲劳特性并考虑了横向升力对于输油管疲劳损伤的影响等。通过分析得出与输油管疲劳特性相关的环境参数及造成输油管疲劳损伤的主要因素,为输油管的设计与分析提供参照。  相似文献   
992.
TBM信息化采集了海量数据,对TBM数据的标准化预处理是进行诸多研究的前提。基于此,提出了一种TBM掘进数据标准化处理方法,依托TBM现场施工掘进大数据,以破岩特征为依据选取基本掘进参数(刀盘转速、推进速度、刀盘推力及刀盘扭矩)分析掘进过程TBM数据特点,提出循环掘进过程空推段、上升段、稳定段及下降段起点的判别方法,对稳定段起点提出了标准差法判别方法、均值判别方法、直方图判别方法,满足实时和非实时的数据划分需求。最后对两个TBM工程的数据进行标准化预处理,实现施工大数据的标准化。结果表明,提出的标准化预处理方法可实现循环掘进过程数据的有效划分。研究成果可推广应用于众多TBM工程的数据标准化处理,有效实现机器学习数据库的建立。  相似文献   
993.
开挖膨胀土能否直接用作填料需跟踪开展CBR试验,而试件浸水需4 d将妨碍路堤填筑新技术的工程应用,有必要研究快速获取膨胀土CBR指标的方法。对百色膨胀土按改进CBR试验方法进行试验,设定不同时刻测试试件的变形和强度值,分析得到2指标的浸水时间效应及其变化规律;引入灰色理论中带1阶加权平均弱化缓冲算子的GM(1,1)模型,对测试结果做了指标值的预测和分析。结果表明,用浸水1 d试件的膨胀变形实测值可预测其浸水4 d的实际值,精度能满足工程要求且偏安全。据此,总结并提出膨胀土填料的改进CBR指标快速确定方法。  相似文献   
994.
Design-manufacturing chain (D-MC) is the most important link of the supply chain with the greatest possibility in cost reduction. How to strengthen the effective management of interfacial relationship between designer and manufacturer and increase the efficency of interface management concerns the efficiency of the whole supply chain. In order to evaluate and improve the impacts of D-MC interfacial relationship, first we should construct the evaluation index system and then we should analyze the total cost and benefit of the interfacial relationship betterment, including the cost of member units in D-MC, the opportunity cost of cooperation partners, and the market returns resulted from the interfacial relationship improvement, which will advance the whole supply chain efficiency as well as enhance the management performance of D-MC. Foundation item: the Chinese Public Service Platform for Science and Technology Management (No. 06DZ22924) and the Economic Globalization and Innovation (No. 08692106700)  相似文献   
995.
Various flexible mechanisms related to quality of service (QoS) provisioning have been specified for uplink traffic at the medium access control (MAC) layer in the IEEE 802.16 standards. Among the mechanisms, contention based bandwidth request scheme can be used to indicate bandwidth demands to the base station for the non-real-time polling and best-effort services. These two services are used for most applications with unknown traffic characteristics. Due to the diverse QoS requirements of those applications, service differentiation (SD) is anticipated over the contention based bandwidth request scheme. In this paper we investigate the SD with the bandwidth request scheme by means of assigning different channel access parameters and bandwidth allocation priorities at different packets arrival probability. The effectiveness of the differentiation schemes is evaluated by simulations. It is observed that the initial backoff window can be efficient in SD, and if combined with the bandwidth allocation priority, the SD performances will be better. Foundation item: the National Basic Research Program (973) of China (No. 2005C13321804)  相似文献   
996.
With life cycle assessment (LCA) methodology, a life cycle model of coal-based vehicle fuels (CBVFs) including coal-based dimethyl ether (CBDME) and coal-based diesel (CBD) is established. Their primary energy consumption (PEC) and global warming potential (GWP) from well to wheel including feedstock extraction, fuel production, fuel consumption in vehicle and energy transportation are calculated and compared. Results show that the life cycle PEC and GWP of CBD pathway are 1.17 and 1.34 times as CBDME pathway. Based on the above results, CBDME will become a choice with great potential to replace conventional petroleum-based diesel (CPBD) in China.  相似文献   
997.
Temporal key integrity protocol (TKIP) is a sub-protocol of IEEE 802.11i. TKIP remedies some security flaws in wired equivalent privacy (WEP) protocol. TKIP adds four new algorithms to WEP: a message integrity code (MIC) called Michael, an initialization vector (IV) sequencing discipline, a key mixing function and a re-keying mechanism. The key mixing function, also called temporal key hash, de-correlates the IVs from weak keys. Some cryptographic properties of the substitution box (S-box) used in the key mixing function are investigated in this paper, such as regularity, avalanche effect, differ uniform and linear structure. Moen et al pointed out that there existed a temporal key recovery attack in TKIP key mixing function. In this paper a method is proposed to defend against the attack, and the resulting effect on performance is discussed.  相似文献   
998.
Recently, the barrier coverage was proposed and received much attention in wireless sensor network (WSN), and the degree of the barrier coverage, one of the critical parameters of WSN, must be re-studied due to the difference between the barrier coverage and blanket coverage. In this paper, we propose two algorithms, namely,local tree based no-way and back (LTNWB) algorithm and sensor minimum cut sets (SMCS) algorithm, for the opened and closed belt regions to determine the degree of the barrier coverage of WSN. Our main objective is to minimize the complexity of these algorithms. For the opened belt region, both algorithms work well, and for the closed belt region, they will still come into existence while some restricted conditions are taken into consideration.Finally, the simulation results demonstrate the feasibility of the proposed algorithms.  相似文献   
999.
In this paper, an approach for designing robust fault detection filter (RFDF) of networked control systems (NCSs) with unknown inputs is studied. The design aims at implementing the optimal trade-off between robustness of unknown inputs (including the item produced by networked-induced delay) and sensitivity of fault. The key design issue is to introduce an optimal fault detection filter based on NCSs with the control law compensation as the reference residual model of NCSs and to formulate the RFDF design as a model-matching problem. By applying H optimization technique, linear matrix inequality (LMI) approach is given to solve the model-matching problem. The validity of the proposed approach is shown by a numerical example.   相似文献   
1000.
It is important to reconstruct a continuous surface representation of the point cloud scanned from a human body. In this paper a new implicit surface method is proposed to reconstruct the human body surface from the points based on the combination of radial basis functions (RBFs) and adaptive partition of unity (PoU). The whole 3D domain of the scanned human body is firstly subdivided into a set of overlapping subdomains based on the improved octrees. The smooth local surfaces are then computed in the subdomains based on RBFs. And finally the global human body surface is reconstructed by blending the local surfaces with the adaptive PoU functions. This method is robust for the surface reconstruction of the scanned human body even with large or non-uniform point cloud which has a sharp density variation. Foundation item: the National Natural Science Foundation of China (No. 50575139) and the Shanghai Special Fund of Informatization (No. 088)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号