首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   575篇
  免费   8篇
  2021年   6篇
  2020年   4篇
  2019年   9篇
  2018年   9篇
  2017年   14篇
  2016年   14篇
  2015年   10篇
  2014年   12篇
  2013年   102篇
  2012年   22篇
  2011年   27篇
  2010年   21篇
  2009年   15篇
  2008年   29篇
  2007年   15篇
  2006年   17篇
  2005年   8篇
  2004年   6篇
  2003年   5篇
  2002年   4篇
  1998年   7篇
  1997年   7篇
  1995年   8篇
  1994年   6篇
  1993年   12篇
  1992年   8篇
  1991年   7篇
  1989年   14篇
  1988年   5篇
  1987年   12篇
  1986年   11篇
  1985年   9篇
  1984年   4篇
  1983年   5篇
  1982年   6篇
  1981年   8篇
  1980年   10篇
  1979年   11篇
  1978年   4篇
  1977年   7篇
  1976年   8篇
  1975年   7篇
  1974年   3篇
  1973年   5篇
  1972年   12篇
  1971年   3篇
  1970年   4篇
  1969年   9篇
  1968年   7篇
  1966年   3篇
排序方式: 共有583条查询结果,搜索用时 15 毫秒
171.
基于圆阵的二维DOA估计新方法   总被引:1,自引:0,他引:1  
通过分析圆阵阵列流形,提出一种新的圆阵二维谱估计模型,可以直接应用MUSIC算法进行二维DOA估计,从而避免了对圆阵输出信号进行模式激励.应用此模型仿真分析了均匀圆阵和均匀半圆阵的二维DOA估计性能,相比模式激励方法,减小了计算量;半圆阵与圆阵的DOA性能差别很小,但是半圆阵减少近一半的阵元数.  相似文献   
172.
随着隐身技术在军用飞机上的广泛应用,反隐身技术成为赢取未来高技术战争必须研究的课题.以F-117 A和B-2飞机为例,分析了现有的飞机红外隐身技术措施,对红外隐身前后系统作用距离进行估算,重点阐述了未来反红外隐身飞机的技术措施,对飞机反隐身技术的发展提出了展望.  相似文献   
173.
现代多功能战机多用电传操纵系统替代传统的机械杆系,但由于飞机的多变量、强耦合和不稳定等强非线性特点,使得其电传控制律的工程实现相当复杂.为此,对电传操纵系统控制律的神经网络实现方法进行了研究.通过利用径向基函数(RBF)网络良好的非线性跟踪性能,探讨了用RBF网络实现电传控制律的一般方法,并以某型飞机电传操纵系统纵向通道为例,对该方法进行了验证.  相似文献   
174.
175.
针对物资供应过程仿真中仿真信息不明确、不完整、比较模糊而又难于定量化描述的问题,引入定性仿真中符号定向图(SDG)法,定性分析了通用物资供应的过程.首先,提取物资供应过程中各定性环节要素,对其建立定性关系方程和定性模型(SDG模型图),然后,根据方程和模型仿真结果给出具体环节因素的取值标准.通过实例验证得出了用定性建模的方法研究物资供应动态过程更加简明实际的结论.  相似文献   
176.
This article is the latest in a series of published articles systematically examining Afghan Presidential and legislative elections. Structural problems including fraud, ethno-linguistic block voting, and the Single Non-Transferable Vote have had significant impacts on the development of Afghan democratic elections. The challenge now facing the current Afghan government and future elections is the daunting task of uniting the Afghan people while not repeating the electoral mistakes of the past. The tricky balancing act of fostering an overarching national identity without being perceived as privileging particular identities requires strong leadership and a willingness to challenge traditional ethnic, linguistic, and religious norms when need be. Karzai and Ghani Administrations have seriously failed relative to this dynamic.  相似文献   
177.
分析了RGB-D传感器的标定模型及标定方法,利用标定棋盘和Matlab工具箱对RGB-D传感器进行了标定。采用摄像机标定方法计算了彩色摄像机和深度摄像机的初始化参数,根据标定棋盘和标定板的共面关系计算了相对位姿的初始估计值,并采用非线性最小化方法对标定参数进行了优化。实验结果表明:标定后的彩色图像和深度图像的重投影误差较小,深度测量不确定性标准差比标定前约减小了1/2,有效地提高了RGB-D传感器的测量精度。  相似文献   
178.
The Replenishment at Sea Planner (RASP) is saving the U.S. Navy millions of dollars a year by reducing fuel consumption of its Combat Logistics Force (CLF). CLF shuttle supply ships deploy from ports to rendezvous with underway U.S. combatants and those of coalition partners. The overwhelming commodity transferred is fuel, ship‐to‐ship by hoses, while other important packaged goods and spare parts are high‐lined, or helicoptered between ships. The U.S. Navy is organized in large areas of responsibility called numbered fleets, and within each of these a scheduler must promulgate a daily forecast of CLF shuttle operations. The operational planning horizon extends out several weeks, or as far into the future as we can forecast demand. We solve RASP with integer linear optimization and a purpose‐built heuristic. RASP plans Replenishment‐at‐Sea (RAS) events with 4‐hour (Navy watch) time fidelity. For five years, RASP has served two purposes: (1) it helps schedulers generate a daily schedule and animates it using Google Earth, and (2) it automates reports command‐to‐ship messages that are essential to keep this complex logistics system operating.  相似文献   
179.
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept.  相似文献   
180.
South Korea is threatened by its troubled relationship with North Korea. North Korea possesses a large cache of missiles as well as chemical and biological weapons, and the future potential to mount nuclear weapons on its missiles. The United States is also challenged because of its defense commitments to Seoul. As a countermeasure, the United States and South Korea decided to deploy Terminal High Altitude Area Defense (THAAD) missile defenses in South Korea. However, China has objected. Chinese scholars believe the THAAD radar would be able to track Chinese inter-continental ballistic missiles, thereby weakening their deterrent. A technical analysis does not support this assertion. However, it is vital for South Korea, given its proximity and economic interdependence, to reassure China. South Korea should highlight that THAAD will be deployed by the United States Forces Korea and is not a commitment by Seoul to become part of U.S.-led missile defenses in the Asia-Pacific.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号