首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2025篇
  免费   1篇
交通运输   2026篇
  2020年   1篇
  2019年   5篇
  2018年   335篇
  2017年   295篇
  2016年   248篇
  2015年   3篇
  2014年   3篇
  2013年   43篇
  2012年   60篇
  2011年   204篇
  2010年   214篇
  2009年   55篇
  2008年   184篇
  2007年   126篇
  2006年   4篇
  2005年   54篇
  2004年   45篇
  2003年   56篇
  2002年   19篇
  2001年   8篇
  2000年   1篇
  1999年   1篇
  1998年   3篇
  1997年   4篇
  1996年   4篇
  1995年   8篇
  1994年   3篇
  1993年   1篇
  1991年   1篇
  1988年   7篇
  1986年   3篇
  1985年   3篇
  1984年   1篇
  1982年   5篇
  1981年   3篇
  1980年   2篇
  1979年   4篇
  1978年   2篇
  1977年   2篇
  1975年   2篇
  1973年   4篇
排序方式: 共有2026条查询结果,搜索用时 15 毫秒
61.
Web page classification is an important application in many fields of Internet information retrieval, such as providing directory classification and vertical search. Methods based on query log which is a light weight version of Web page classification can avoid Web content crawling, making it relatively high in efficiency, but the sparsity of user click data makes it difficult to be used directly for constructing a classifier. To solve this problem, we explore the semantic relations among different queries through word embedding, and propose three improved graph structure classification algorithms. To reflect the semantic relevance between queries, we map the user query into the low-dimensional space according to its query vector in the first step. Then, we calculate the uniform resource locator (URL) vector according to the relationship between the query and URL. Finally, we use the improved label propagation algorithm (LPA) and the bipartite graph expansion algorithm to classify the unlabeled Web pages. Experiments show that our methods make about 20% more increase in F1-value than other Web page classification methods based on query log.  相似文献   
62.
An improved numerical method is used to simulate the dynamic behavior of a two part towing cable systems during turnings. In U turns and full turns, periodical heave motions are found both for the towed vehicle and for the depressor. Periodic motions of the subsea units and of the cable surface tension are closely related to the turning parameters, such as turning velocity and turning radius. System parameters, such as length of the second cable and the vehicle hydrodynamics, also damp turning instability.  相似文献   
63.
64.
Performance degradation and random shock are commonly regarded as two dependent competing risks for system failures. One method based on effective service age is proposed to jointly model the cumulative effect of random shock and system degradation, and the reliability model of degradation system under Nonhomogeneous Poisson processes (NHPP) shocks is derived. Under the assumption that preventive maintenance (PM) is imperfective and the corrective maintenance (CM) is minimal repair, one maintenance policy which combines PM and CM is presented. Moreover, the two decision variables, PM interval and the number of PMs before replacement, are determined by a multi-objective maintenance optimization method which simultaneously maximizes the system availability and minimizes the system long-run expect cost rate. Finally, the performance of the proposed maintenance optimization policy is demonstrated via a numerical example.  相似文献   
65.
With the simultaneous rise of energy costs and demand for cloud computing, efficient control of data centers becomes crucial. In the data center control problem, one needs to plan at every time step how many servers to switch on or off in order to meet stochastic job arrivals while trying to minimize electricity consumption. This problem becomes particularly challenging when servers can be of various types and jobs from different classes can only be served by certain types of server, as it is often the case in real data centers. We model this problem as a robust Markov decision process (i.e., the transition function is not assumed to be known precisely). We give sufficient conditions (which seem to be reasonable and satisfied in practice) guaranteeing that an optimal threshold policy exists. This property can then be exploited in the design of an efficient solving method, which we provide. Finally, we present some experimental results demonstrating the practicability of our approach and compare with a previous related approach based on model predictive control.  相似文献   
66.
The present paper presents a historical review associated with the research works on hull girder strength of ship and ship-shaped structures. Then, a new program is developed to determine the ultimate vertical bending moment of hull girder by applying direct method, stress distribution method, and progressive collapse analysis method. Six ships and ship-shaped structures used in the benchmark study of International Ship and Offshore Structures Congress (ISSC) in 2012 are adopted as examples. The calculation results by applying the developed program are analyzed and compared with the existing results. Finally, the roles of the developed program and its further development are discussed.  相似文献   
67.
In order to remotely monitor and maintain large-scale complex equipment in real time, China Telecom plans to create a total solution that integrates remote data collection, transmission, storage, analysis and prediction. This solution can provide manufacturers with proactive, systematic, integrated operation and maintenance service, and the data analysis and health forecasting are the most important part. This paper conducts health management for the turbine blades. Elman neural network, and improved Elman neural network, i.e., outputhidden feedback (OHF) Elman neural network are studied as the main research methods. The results verify the applicability of OHF Elman neural network.  相似文献   
68.
69.
Although fuel cost has been the largest portion of annual operating costs of construction equipment, it is possible to save the energy and reduce cost using fuel economy enhancement technology. In this study, an organic Rankine cycle is applied to an excavator in order to recover waste heat, reproduce it into electrical energy, and consequently reduce the fuel consumption by 10 %. A design process was carried out to develop an exhaust gas superheater that recovers the waste heat from exhaust gas through a composite-dimensional thermal flow analysis. A one-dimensional code was developed to perform a size design for the exhaust gas superheater. The ranges for the major design parameters were determined to satisfy the target of the heat recovery, as well as the pressure drop at both fluid sides. Performance analysis was done through onedimensional design code results, which were compared with three-dimensional CFD analysis. By utilizing a 3D commercial code, the arrangement of the tubes was selected and the working fluid pressure drop was reduced through a detailed layout design. The design procedure was verified by a performance evaluation of the prototype, which yielded only a 7 % tolerance in heat recovery.  相似文献   
70.
In the connected vehicles, connecting interfaces bring threats to the vehicles and they can be hacked to impact the vehicles and drivers. Compared with traditional vehicles, connected vehicles require more information transfer. Sensor signals and critical data must be protected to ensure the cyber security of connected vehicles. The communications among ECUs, sensors, and gateways are connected by in-vehicle networks. This paper discussed the state-of-art techniques about secure communication for in-vehicle networks. First, the related concepts in automotive secure communication have been provided. Then we have compared and contrasted existing approaches for secure communication. We have analyzed the advantages/disadvantages of MAC and digital signatures for message authentication and compared the performance and limitations of different cryptographic algorithms. Firewall and intrusion detection system are introduced to protect the networks. The constraints and features of different intrusion detection approaches are presented. After that, the technical requirements for cryptographic mechanism and intrusion detection policy are concluded. Based on the review of current researches, the future development directions of the automotive network security have been discussed. The purpose of this paper is to review current techniques on automotive secure communication and suggest suitable secure approaches to implement on the in-vehicle networks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号