首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   669篇
  免费   304篇
  国内免费   28篇
  2024年   6篇
  2023年   14篇
  2022年   12篇
  2021年   11篇
  2020年   11篇
  2019年   17篇
  2018年   20篇
  2017年   32篇
  2016年   56篇
  2015年   52篇
  2014年   67篇
  2013年   82篇
  2012年   59篇
  2011年   59篇
  2010年   44篇
  2009年   48篇
  2008年   32篇
  2007年   40篇
  2006年   36篇
  2005年   54篇
  2004年   41篇
  2003年   28篇
  2002年   31篇
  2001年   33篇
  2000年   25篇
  1999年   15篇
  1998年   24篇
  1997年   10篇
  1996年   6篇
  1995年   6篇
  1994年   8篇
  1993年   6篇
  1992年   7篇
  1991年   4篇
  1990年   3篇
  1989年   1篇
  1988年   1篇
排序方式: 共有1001条查询结果,搜索用时 15 毫秒
281.
二维离散余弦/反余弦变换是图像处理算法的核心。基于DSP处理器或软件实现速度较低,以及ASIC实现芯片的面积和功耗都较大,本文研究了一种基于行列分解结构的二维DCT/IDCT变换,在两级一维DCT/IDCT变换之间插入双RAM结构,通过乒乓操作保证了前后级DCT/IDCT运算的并行性,提高了运算速度。电路结构在QuartusII中进行了逻辑综合,通过Modelsim编写激励对逻辑功能进行了仿真验证,并将仿真结果与Mat—lab仿真结果进行了比较。结果表明该模块功能正确,能够为图像处理提供良好的处理性能。  相似文献   
282.
强军目标是新时期军队建设的行动纲领。思想政治建设必须围绕强军目标展开。军队思想政治工作受所处环境的影响和制约。贯彻强军目标创设良好的思想政治工作环境,首先要从本单位自身做起,建设净化优美的军营“小环境”,塑造军营环境的“奋斗之关”“陶冶之美”“形象之美”,增强思想政治工作环境的推动力、感染力和约束力。  相似文献   
283.
非相参多点源诱偏技术是对抗反辐射导弹(ARM)的有效手段。以ARM目标分辨的二分组理论和双点源诱偏的仿真结果为依据,对等功率三点源诱偏的2种经典布局的ARM落点整体分布进行预测。通过对ARM落点和系统被击中概率曲线的分析及拟合处理,验证了预测的正确性及系统被击中概率与占地面积的相关性,为通信辐射源抗ARM的布设提供一定的参考。  相似文献   
284.
针对校验矩阵形如准循环双对角阵的结构化LDPC码,对比研究了两类高效的编码算法:矩阵分解编码算法和分项累加递归编码算法,证明了两类算法从实现角度是等价的,但分项累加递归编码算法推导更为直观,且便于硬件并行实现。基于分项累加编码算法,提出了一种适合准循环双对角LDPC码的部分并行编码结构,设计实现了IEEE 802.11n标准中的LDPC码编码器。FPGA实现结果表明,所设计的LDPC编码器具有硬件开销较小、吞吐率高的优点,在码长为1944bit、码率为5/6时信息比特吞吐率最高可达13Gbps。  相似文献   
285.
Secret French plans to launch guerrilla-style raids on the British Isles devised in the spring of 1796 were referred to as ‘chouanneries’. The name and concept behind these small-war operations were modelled on the irregular tactics used by the Chouan rebels in the Vendée, which the French state army had brutally quashed, but some wished to transfer into their institutional practice. Part of France's ongoing military strategy in the war against Britain, which included fomenting insurrection in Ireland, these irregular operations were to be manned partially by pardoned deserters and released convicts and prisoners of war. Of these, only Tate's brief invasion of Wales in 1797 was realised, but the surviving plans provide insightful historical lessons into an Anglophobic mindset shared by a small network of practitioners and policy deciders on the effectiveness of such shock and awe tactics. Largely motivated by the desire to take revenge for Britain's support of counter-revolutionaries in the Vendée, these plans could more aptly be referred to as counter-‘chouanneries’.  相似文献   
286.
针对非相干背景光辐照二波耦合中参数的最佳匹配设计问题,提出了一种基于随机共振理论的研究方法。首先,文章通过二波耦合过程进行物理机理分析和数值实验分析,证明了该问题在本质上可归结为一种随机共振现象。其次,从随机共振的角度,研究其中的最佳参数设计问题,给出了一种分布处理的最优参数设计流程。按照该方法,在给定增益要求的情况下,先根据信号光饱和与否来确定晶体长度,最后根据非相干光的比例对增益的影响来确定非相干光的比例。仿真实验表明,经过最佳参数设计后,信号的增益和输出信噪比上均有显著提高。  相似文献   
287.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014  相似文献   
288.
This article modifies the associations made by historians and political scientists of Spanish guerrilla warfare with revolutionary insurgency. First, it explains how the guerrilla phenomenon moved from a Leftist to a reactionary symbol. Second, it compares the insurgency and counter-insurgency features of the Carlist War (1833–1840) with those of the better-known Peninsular War (1808–1814). Third, it shows how erstwhile guerrilla leaders during the Carlist War made their expertise available to the counter-insurgency, in a socio-economic as well as military setting. This article revises the social banditry paradigm in nineteenth-century Spain in the under-researched context of Europe bloodiest nineteenth-century civil war.  相似文献   
289.
为了满足远距离海底探测对发射信号大功率的需求,选用了一种大功率可控硅开关功率放大器。在临界换流、自然换流和强迫换流3种工作状态下,分析了该功率放大器的工作原理,并建立了等效电路模型。运用Or CAD仿真了临界换流状态时的等效电路模型;在自然换流状态和强迫换流状态下,为获得功放电流值和负载电流值,对其等效电路模型分别建立了非线性数学模型,并通过Matlab和VC++采用四阶Runge-Kutta法对非线性数学模型进行求解。以上方法能够求得该功率放大器电路在任意时刻、任意点处的电流电压值,能较客观、真实地反映电路的工作状况,对工程应用具有一定的参考价值。  相似文献   
290.
This paper provides a political economy analysis of the evolution of unmanned aerial vehicles (UAV), or ‘drones’ in the USA. Focus is placed on the interplay between the polity and private economic influences, and their impact on the trajectory of political, economic, and military outcomes. We identify the initial formation of the drone industry, trace how the initial relationships between the military and the private sector expanded over time, and discuss present relationships. Understanding the historical evolution of UAV technology, as well as the major players in the industry today, is important for ongoing policy debates regarding the use of drones both domestically and internationally.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号