首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1568篇
  免费   690篇
  国内免费   172篇
  2024年   9篇
  2023年   15篇
  2022年   23篇
  2021年   28篇
  2020年   35篇
  2019年   32篇
  2018年   20篇
  2017年   114篇
  2016年   112篇
  2015年   94篇
  2014年   125篇
  2013年   132篇
  2012年   169篇
  2011年   121篇
  2010年   100篇
  2009年   141篇
  2008年   98篇
  2007年   137篇
  2006年   150篇
  2005年   110篇
  2004年   97篇
  2003年   75篇
  2002年   66篇
  2001年   63篇
  2000年   51篇
  1999年   52篇
  1998年   45篇
  1997年   39篇
  1996年   34篇
  1995年   21篇
  1994年   25篇
  1993年   18篇
  1992年   25篇
  1991年   15篇
  1990年   19篇
  1989年   13篇
  1988年   5篇
  1987年   2篇
排序方式: 共有2430条查询结果,搜索用时 46 毫秒
761.
反潜机是重要的反潜力量,根据反潜机搜潜情况,建立了反潜飞机采用阿基米德螺旋线样式搜潜的数学模型和目标运动模型,讨论了螺旋线采用的三种轨迹间隔,通过仿真验证,确立了反潜机搜潜最优轨迹间隔,以达到提高发现目标潜艇概率、优化反潜效能的目的,为反潜飞机采用阿基米德巡逻线搜潜样式搜潜时提供战术参考。  相似文献   
762.
靶场在进行智能鱼雷鉴定试验任务时,实时准确地检测出鱼雷自导信号的频率成分是靶标信号处理中的重要环节,谱线比值法便是靶标进行信号处理时检测信号频率的一种有效方法。本文介绍了谱线比值法的基本原理,针对目前鱼雷自导信号特点,对该方法提出了改进方案并进行了仿真。仿真结果表明,经改进的谱线比值法能够满足靶标检测复杂鱼雷自导信号体制下信号频率的使用要求。  相似文献   
763.
对来袭鱼雷的制导类型进行识别是水面舰艇实施有针对性鱼雷防御的前提条件,方位变化率则可作为类型识别的一个重要的识别依据。首先,从不同类型潜射鱼雷的发射方式和弹道特征入手,分别推导出潜射直航鱼雷、声自导鱼雷、尾流自导鱼雷方位变化率的表达式。其次,仿真分析了不同类型潜射鱼雷方位变化率的影响因素。最后,在给定的态势下,给出了四种不同类型潜射鱼雷方位变化率随雷舰距离的变化规律曲线。仿真结果能为鱼雷制导类型识别提供一定的参考依据。  相似文献   
764.
三相逆变器在实际运行中,不平衡负载工况较为常见,原因是传统积分控制加状态反馈控制无法实现三相输出电压的对称性。针对该问题提出了不平衡负载条件下三相逆变器新型积分控制加状态反馈控制策略,并通过仿真和实验验证了该策略能有效降低不平衡负载时三相逆变器输出电压的不平衡度,从而获得对称的三相输出电压波形。  相似文献   
765.
首先,在研究飞行器背景磁干扰模型与小信号模型的基础上,分析了地磁梯度沿纬度与高度的变化规律,分析可知由于飞行器的机动,地磁梯度会对测量结果造成影响;然后,考虑地磁梯度因素,对原有小信号模型求解方法进行了改进:飞行器在四个航向上做小角度的机动飞行,将地磁场沿纬度与高度的梯度作为未知量,与飞行器磁干扰模型中的剩磁参数、感磁参数和涡磁参数一起求解;最后,利用实测试验数据进行了验证,结果表明:考虑地磁梯度的影响与不考虑地磁梯度的影响相比,求解的模型参数可以在细节上进一步提高飞行器背景磁干扰的补偿效果。  相似文献   
766.
Secret French plans to launch guerrilla-style raids on the British Isles devised in the spring of 1796 were referred to as ‘chouanneries’. The name and concept behind these small-war operations were modelled on the irregular tactics used by the Chouan rebels in the Vendée, which the French state army had brutally quashed, but some wished to transfer into their institutional practice. Part of France's ongoing military strategy in the war against Britain, which included fomenting insurrection in Ireland, these irregular operations were to be manned partially by pardoned deserters and released convicts and prisoners of war. Of these, only Tate's brief invasion of Wales in 1797 was realised, but the surviving plans provide insightful historical lessons into an Anglophobic mindset shared by a small network of practitioners and policy deciders on the effectiveness of such shock and awe tactics. Largely motivated by the desire to take revenge for Britain's support of counter-revolutionaries in the Vendée, these plans could more aptly be referred to as counter-‘chouanneries’.  相似文献   
767.
针对非相干背景光辐照二波耦合中参数的最佳匹配设计问题,提出了一种基于随机共振理论的研究方法。首先,文章通过二波耦合过程进行物理机理分析和数值实验分析,证明了该问题在本质上可归结为一种随机共振现象。其次,从随机共振的角度,研究其中的最佳参数设计问题,给出了一种分布处理的最优参数设计流程。按照该方法,在给定增益要求的情况下,先根据信号光饱和与否来确定晶体长度,最后根据非相干光的比例对增益的影响来确定非相干光的比例。仿真实验表明,经过最佳参数设计后,信号的增益和输出信噪比上均有显著提高。  相似文献   
768.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014  相似文献   
769.
This article modifies the associations made by historians and political scientists of Spanish guerrilla warfare with revolutionary insurgency. First, it explains how the guerrilla phenomenon moved from a Leftist to a reactionary symbol. Second, it compares the insurgency and counter-insurgency features of the Carlist War (1833–1840) with those of the better-known Peninsular War (1808–1814). Third, it shows how erstwhile guerrilla leaders during the Carlist War made their expertise available to the counter-insurgency, in a socio-economic as well as military setting. This article revises the social banditry paradigm in nineteenth-century Spain in the under-researched context of Europe bloodiest nineteenth-century civil war.  相似文献   
770.
基于检测的人体跟踪算法   总被引:1,自引:0,他引:1       下载免费PDF全文
传统的目标跟踪算法需要人为标定跟踪区域,且受到漂移问题的影响。为了解决这些困难,针对人体跟踪问题,提出了一种新的基于检测的跟踪算法。为了减少漏跟踪,使用了多个检测算子,用来定位多个身体部位,将其检测结果映射到一个相同的身体区域。为了适应快速运动的目标,使用KLT跟踪和凝聚聚类将检测窗口连接起来形成人体轨迹。实验结果表明:使用多个检测算子明显地提高了跟踪性能;KLT跟踪对于快速运动目标具有适应能力。该算法基本满足实时性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号