首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   420篇
  免费   151篇
  国内免费   37篇
  2024年   2篇
  2023年   1篇
  2022年   6篇
  2021年   13篇
  2020年   4篇
  2019年   5篇
  2018年   5篇
  2017年   21篇
  2016年   33篇
  2015年   25篇
  2014年   37篇
  2013年   43篇
  2012年   29篇
  2011年   26篇
  2010年   26篇
  2009年   26篇
  2008年   12篇
  2007年   18篇
  2006年   36篇
  2005年   35篇
  2004年   30篇
  2003年   22篇
  2002年   18篇
  2001年   21篇
  2000年   20篇
  1999年   21篇
  1998年   16篇
  1997年   11篇
  1996年   11篇
  1995年   11篇
  1994年   5篇
  1993年   6篇
  1992年   5篇
  1991年   1篇
  1990年   3篇
  1989年   2篇
  1988年   2篇
排序方式: 共有608条查询结果,搜索用时 15 毫秒
171.
3-nitro-1,2,4-triazol-5-one (NTO) is the main component of insensitive munitions (IM) formulation because of its outstanding insensitive properties.In this paper,a series of NTO/HMX-based composite explosives were prepared and characterized.The study focuses on the effect of NTO on the performance of the formulations,especially the safety performance.The results revealed that the mechanical sensi-tivity of formulations was associated with NTO content,as well as the thermal conductivity,specific heat capacity and Arrhenius parameters.Then,the high amount of NTO using in formulation was proved to be helpful for NTO/HMX-based formulation to exhibit good thermal safety.Besides,by accelerating rate calorimeter (ARC) and a modified cook-offequipment,the pressure and pressure rise rate were proved as the important indicator for judging the thermal safety performance in confined spaces.Finally,the numerical simulation was used as a credible method for predicting the respond temperature of cook-off experiment.  相似文献   
172.
文章分析了3G无线视音频系统具有的优势,对3G视音频传输系统组网方式和功能进行了描述,探讨了非战争军事行动中通信保障面临的主要问题。  相似文献   
173.
设计是作战行动筹划的重要步骤,精确工程保障需要对工程保障行动进行精密的设计和精确管理与控制。科学管理采用科学实验的方法,通过劳动方法标准化和差别计件工资制度,有效提高了工作效率,其基本原理经过百余年的实际检验,被证明是一个成熟有效的管理方法。借鉴科学管理理论,需要对工程保障行动进行动作研究,进而研究工程保障行动的作业标准,以期提高其保障效率。精益管理是在科学管理在新的历史时期的发展与改进,它使用了准时制、零库存、均衡生产、持续改进等先进的管理理念和六西格玛管理、成组技术等先进技术,为基于信息系统体系作战的工程保障能力生成提供了有益的借鉴,可加深我们对精确工程保障的理解,促进精确工程保障研究的可操作性。  相似文献   
174.
从验证的概念讨论出发,针对“指挥信息系统验证”,从概念和含义、产品和结果、目的和作用等多方面进行了详细解读,给出了较详细的验证方法和步骤,并就验证与测试的区别和关联进行了讨论,然后对广义概念上的“指挥信息系统验证”做了更深入的探讨,最后提出了验证应遵序的原则和注意事项。  相似文献   
175.
火控雷达组网是应对未来末端防御作战挑战的有效途径。提出了基于指挥信息系统的火控雷达组网方式,并分析了该方式的优势。继而基于末端防御战斗部署一般要求和火控雷达组网系统对空侦察配系的特殊要求,经仿真计算得出和分析了火控雷达组网系统的典型对空侦察配系。最后详细论述了火控雷达组网系统的指挥控制要点。研究结果对于促进末端防御部队形成以信息系统为核心的体系作战能力具有重要意义。  相似文献   
176.
Secret French plans to launch guerrilla-style raids on the British Isles devised in the spring of 1796 were referred to as ‘chouanneries’. The name and concept behind these small-war operations were modelled on the irregular tactics used by the Chouan rebels in the Vendée, which the French state army had brutally quashed, but some wished to transfer into their institutional practice. Part of France's ongoing military strategy in the war against Britain, which included fomenting insurrection in Ireland, these irregular operations were to be manned partially by pardoned deserters and released convicts and prisoners of war. Of these, only Tate's brief invasion of Wales in 1797 was realised, but the surviving plans provide insightful historical lessons into an Anglophobic mindset shared by a small network of practitioners and policy deciders on the effectiveness of such shock and awe tactics. Largely motivated by the desire to take revenge for Britain's support of counter-revolutionaries in the Vendée, these plans could more aptly be referred to as counter-‘chouanneries’.  相似文献   
177.
针对非相干背景光辐照二波耦合中参数的最佳匹配设计问题,提出了一种基于随机共振理论的研究方法。首先,文章通过二波耦合过程进行物理机理分析和数值实验分析,证明了该问题在本质上可归结为一种随机共振现象。其次,从随机共振的角度,研究其中的最佳参数设计问题,给出了一种分布处理的最优参数设计流程。按照该方法,在给定增益要求的情况下,先根据信号光饱和与否来确定晶体长度,最后根据非相干光的比例对增益的影响来确定非相干光的比例。仿真实验表明,经过最佳参数设计后,信号的增益和输出信噪比上均有显著提高。  相似文献   
178.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014  相似文献   
179.
This article modifies the associations made by historians and political scientists of Spanish guerrilla warfare with revolutionary insurgency. First, it explains how the guerrilla phenomenon moved from a Leftist to a reactionary symbol. Second, it compares the insurgency and counter-insurgency features of the Carlist War (1833–1840) with those of the better-known Peninsular War (1808–1814). Third, it shows how erstwhile guerrilla leaders during the Carlist War made their expertise available to the counter-insurgency, in a socio-economic as well as military setting. This article revises the social banditry paradigm in nineteenth-century Spain in the under-researched context of Europe bloodiest nineteenth-century civil war.  相似文献   
180.
目前卫星轨道参数的测量主要依靠地面测控站的无线电测量,使得测量受限于测控站的观测弧段;另一方面随着深空探测的不断深入,也对现有测控方法提出了新的挑战。利用卫星上已有的相机通过景象匹配对卫星自身位置进行精确测量,可以有效摆脱地面测量观测弧段和测量距离的约束。本文提出了一种基于星载实时图与基准图匹配的视觉测轨方法:通过景象匹配建立实时图中特征点与基准图的对应关系,再根据成像关系解算卫星的三维位置。利用卫星获取的立体图像和轨道测量数据进行了验证实验,证明了本文提出的方法具有较高的精度,实现了地基无线电测轨和视觉测轨的相互验证。本文提出的视觉测轨方法可以弥补现有测轨方式的不足,减轻地面测控系统负担,在深空探测等领域具有良好的应用前景。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号