首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3585篇
  免费   87篇
  国内免费   1篇
  2021年   38篇
  2019年   92篇
  2018年   57篇
  2017年   81篇
  2016年   82篇
  2015年   70篇
  2014年   73篇
  2013年   764篇
  2012年   46篇
  2011年   56篇
  2010年   57篇
  2009年   50篇
  2008年   71篇
  2007年   60篇
  2006年   46篇
  2005年   47篇
  2004年   56篇
  2003年   45篇
  2002年   59篇
  1999年   42篇
  1998年   47篇
  1997年   51篇
  1996年   63篇
  1995年   43篇
  1994年   62篇
  1993年   64篇
  1992年   59篇
  1991年   74篇
  1990年   40篇
  1989年   73篇
  1988年   80篇
  1987年   70篇
  1986年   71篇
  1985年   64篇
  1984年   37篇
  1983年   42篇
  1982年   43篇
  1981年   46篇
  1980年   51篇
  1979年   47篇
  1978年   49篇
  1977年   45篇
  1976年   46篇
  1975年   47篇
  1974年   52篇
  1973年   50篇
  1972年   52篇
  1971年   43篇
  1970年   41篇
  1969年   40篇
排序方式: 共有3673条查询结果,搜索用时 15 毫秒
331.
借助于计算流体力学软件,对导管螺旋桨的敞水性能进行了数值模拟,得到了在不同网格模型和湍流模型下导管螺旋桨的正车敞水性能曲线,通过与试验图谱的对比分析,发现Wilcoxk-ω模型更适合于导管螺旋桨的敞水性能计算,并且采用结构化网格和非结构化网格相结合的计算方法能够满足导管螺旋桨敞水性能预报的工程精度要求。同时,当网格中存在少量高度倾斜的网格单元时,在不影响计算收敛的情况下,仍能将计算误差控制在10%以内。此外,如果要获得更为精确的计算结果,应提高网格质量,尽量使用结构化网格,并将近壁面网格加密,合理控制壁面附近的Y+值。虽然网格数量的增加并不总是意味着计算误差的减少,但合理控制网格细密度能够获得更为可信的计算结果。  相似文献   
332.
The purpose of this article is to explore the economic theoretical foundations of the idea that rational terrorist organizations deliberately randomize their attacks (by type, timing, location, and targets) to generate uncertainty and intimidation. A choice theoretic framework is applied to the analysis of the terrorist organization's behavior to determine whether welfare (utility) gains from the randomization of terrorist attacks are plausible and feasible. The randomization of attacks can appear to promise higher amounts of political influence for each resource input but it turns out that randomization cannot manufacture a situation where higher amounts of political influence are obtained for each resource input.The results imply that, rather than randomization and instability, the rational terrorist organization is more likely to prefer stability. The findings and implications provide a theoretical explanation for the non-randomness of terrorist attacks.Thismay be one small step towards explaining the patterns – non-randomness – in the time-series of terrorist incidents.  相似文献   
333.
为了解决传统的自适应均衡技术需发送训练序列的问题,采用盲均衡技术,利用接收信号本身的特征使均衡器收敛。提出了一种新的盲均衡算法(C&D算法),该算法将CRIMNO算法和判决引导(Decision Directed,DD)算法相结合,利用信号序列间的互不相关特性,从而使其具有全局收敛性能。实验结果表明:与CRIMNO算法相比,在相同的信噪比下,该算法具有收敛快速、运算量少和残留误差小的特点。  相似文献   
334.
RBF网络用于战车火控系统弹道解算的方法   总被引:1,自引:0,他引:1  
弹道解算问题对战车火控系统的性能有着直接的影响.传统的弹道解算方法在精度和实时性方面都存在一定的局限性.为了提高解算精度、战车首发命中率和解算的实时性,基于RBF网络的函数逼近及预测能力,将RBF网络用于弹道解算,对传统算法进行优化,得到了新的弹道解算方法.最后对所提方法进行了仿真,发现新方法在解算精度没有降低的条件下,大大提高了弹道解算的实时性.  相似文献   
335.
Calculations for large Markovian finite source, finite repair capacity two-echelon repairable item inventory models are shown to be feasible using the randomization technique and a truncated state space approach. More complex models (involving transportation pipelines, multiple-item types and additional echelon levels) are also considered.  相似文献   
336.
The general problem we are concerned with here is the estimation of Pθ(C) where C is some fixed event and Pθ is unknown in some class. The various available estimation procedures seem to involve the choice of some random probability measure. In particular we consider this problem when C is a disk in R2 centered at o and Pθ is restricted to be bivariate normal. Details concerning the implementation of the estimation procedures and a Monte Carlo study are discussed for this case. This particular problem arises when we are concerned with assessing the accuracy of a targeting procedure.  相似文献   
337.
The problem is to protect a set of t targets by n perfect interceptors against an attack by m perfect weapons. If the defender solves for an optimal preallocated preferential defense and associated game value assuming m1 attackers, and the attacker knows the assumption of the defender and utilizes m2 attackers, he may be able to achieve significantly more damage than had the defender assumed that there would be m2 attackers. The article treats the robustness of preallocated preferential defense to assumptions about the size of the attack and presents results of an alternative approach.  相似文献   
338.
We consider the problem of sequencing n jobs on a single machine, with each job having a processing time and a common due date. The common due date is assumed to be so large that all jobs can complete by the due date. It is known that there is an O(n log n)‐time algorithm for finding a schedule with minimum total earliness and tardiness. In this article, we consider finding a schedule with dual criteria. The primary goal is to minimize the total earliness and tardiness. The secondary goals are to minimize: (1) the maximum earliness and tardiness; (2) the sum of the maximum of the squares of earliness and tardiness; (3) the sum of the squares of earliness and tardiness. For the first two criteria, we show that the problems are NP‐hard and we give a fully polynomial time approximation scheme for both of them. For the last two criteria, we show that the ratio of the worst schedule versus the best schedule is no more than . © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 422–431, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10020  相似文献   
339.
Variations of Hale's channel assignment problem, the L(j, k)‐labeling problem and the radio labeling problem require the assignment of integers to the vertices of a graph G subject to various distance constraints. The λj,k‐number of G and the radio number of G are respectively the minimum span among all L(j, k)‐labelings, and the minimum span plus 1 of all radio labelings of G (defined in the Introduction). In this paper, we establish the λj,k‐number of ∏ K for pairwise relatively prime integers t1 < t2 < … < tq, t1 ≥ 2. We also show the existence of an infinite class of graphs G with radio number |V(G)| for any diameter d(G). © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2005  相似文献   
340.
US national security guidance, as well as the US Army’s operational experiences since 2001, emphasizes the importance of working closely with partner countries to achieve US strategic objectives. The US Army has introduced the global landpower network (GLN) concept as a means to integrate, sustain and advance the Army’s considerable ongoing efforts to meet US national security guidance. This study develops the GLN concept further, and addresses three questions. What benefits can the GLN provide the Army? What are the essential components of the GLN? What options exist for implementing the GLN concept? By developing the GLN concept, the Army has the opportunity to transition the GLN from an often ad hoc and reactive set of relationships to one that the Army more self-consciously prioritizes and leverages as a resource to meet US strategic objectives.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号