首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   663篇
  免费   258篇
  国内免费   24篇
  2024年   4篇
  2023年   13篇
  2022年   6篇
  2021年   8篇
  2020年   11篇
  2019年   18篇
  2018年   18篇
  2017年   37篇
  2016年   49篇
  2015年   49篇
  2014年   63篇
  2013年   77篇
  2012年   56篇
  2011年   45篇
  2010年   40篇
  2009年   47篇
  2008年   32篇
  2007年   35篇
  2006年   37篇
  2005年   42篇
  2004年   41篇
  2003年   28篇
  2002年   27篇
  2001年   38篇
  2000年   25篇
  1999年   14篇
  1998年   21篇
  1997年   10篇
  1996年   5篇
  1995年   8篇
  1994年   10篇
  1993年   4篇
  1992年   13篇
  1991年   5篇
  1990年   7篇
  1988年   2篇
排序方式: 共有945条查询结果,搜索用时 15 毫秒
301.
对成像雷达的脉冲分段排序转发干扰   总被引:1,自引:1,他引:0       下载免费PDF全文
多假目标图像欺骗是目前宽带雷达干扰的难点。针对宽带雷达中常用的线性调频(Linear Frequency Modulated,LFM)信号,提出一种脉冲分段排序转发干扰方法。结合散射波信号模型,推导了合成干扰信号二维成像输出形式,讨论了假目标图像个数、分辨率与分段数以及转发次序之间的关系,并进行了仿真实验。结果表明该干扰方法可较便捷地产生多个沿距离向分布的假目标图像。结果对于成像雷达图像欺骗干扰具有理论指导意义。  相似文献   
302.
针对非相干背景光辐照二波耦合中参数的最佳匹配设计问题,提出了一种基于随机共振理论的研究方法。首先,文章通过二波耦合过程进行物理机理分析和数值实验分析,证明了该问题在本质上可归结为一种随机共振现象。其次,从随机共振的角度,研究其中的最佳参数设计问题,给出了一种分布处理的最优参数设计流程。按照该方法,在给定增益要求的情况下,先根据信号光饱和与否来确定晶体长度,最后根据非相干光的比例对增益的影响来确定非相干光的比例。仿真实验表明,经过最佳参数设计后,信号的增益和输出信噪比上均有显著提高。  相似文献   
303.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014  相似文献   
304.
This article modifies the associations made by historians and political scientists of Spanish guerrilla warfare with revolutionary insurgency. First, it explains how the guerrilla phenomenon moved from a Leftist to a reactionary symbol. Second, it compares the insurgency and counter-insurgency features of the Carlist War (1833–1840) with those of the better-known Peninsular War (1808–1814). Third, it shows how erstwhile guerrilla leaders during the Carlist War made their expertise available to the counter-insurgency, in a socio-economic as well as military setting. This article revises the social banditry paradigm in nineteenth-century Spain in the under-researched context of Europe bloodiest nineteenth-century civil war.  相似文献   
305.
为了满足远距离海底探测对发射信号大功率的需求,选用了一种大功率可控硅开关功率放大器。在临界换流、自然换流和强迫换流3种工作状态下,分析了该功率放大器的工作原理,并建立了等效电路模型。运用Or CAD仿真了临界换流状态时的等效电路模型;在自然换流状态和强迫换流状态下,为获得功放电流值和负载电流值,对其等效电路模型分别建立了非线性数学模型,并通过Matlab和VC++采用四阶Runge-Kutta法对非线性数学模型进行求解。以上方法能够求得该功率放大器电路在任意时刻、任意点处的电流电压值,能较客观、真实地反映电路的工作状况,对工程应用具有一定的参考价值。  相似文献   
306.
脉冲力的瞬间作用会引起攻角和侧滑角的急剧变化,对末修弹飞行稳定性产生较大的影响.以线性化运动微分方程组为数学解析手段,对末修弹脉冲作用稳定性进行深入分析研究.数值仿真表明,采用小扰动法分析弹丸脉冲控制弹丸飞行稳定性是可行的.  相似文献   
307.
This paper provides a political economy analysis of the evolution of unmanned aerial vehicles (UAV), or ‘drones’ in the USA. Focus is placed on the interplay between the polity and private economic influences, and their impact on the trajectory of political, economic, and military outcomes. We identify the initial formation of the drone industry, trace how the initial relationships between the military and the private sector expanded over time, and discuss present relationships. Understanding the historical evolution of UAV technology, as well as the major players in the industry today, is important for ongoing policy debates regarding the use of drones both domestically and internationally.  相似文献   
308.
If international terrorism is on a rising trend, an important source of confirmation or refutation of this is time‐series data on terrorist activity. Using chiefly data collected by the RAND/MIPT consortium we show using basic statistical analysis that in the period 1968–2005 the yearly number of all international terrorist incidents shows no trend over time, but fluctuates year on year in a random manner. On the other hand some indicators do show a definite trend over time, principally the steady rise in the number of incidents that are death‐dealing in nature. A further conclusion is drawn, showing that the proportion of these incidents leading to deaths above a given level is virtually fixed.  相似文献   
309.
ATOMS FOR PEACE     
Atomic Assistance: How “Atoms for Peace” Programs Cause Nuclear Insecurity, by Matthew Fuhrmann, Cornell University Press, 2012, 344 pages, $29.95.  相似文献   
310.
ABSTRACT

In March 2015, the South Australian state government established a royal commission to investigate the financial, social, technical, diplomatic, and nonproliferation benefits and risks of expanding its nuclear industry, including activities related to uranium mining; enriching, reprocessing, and fabricating nuclear fuels for both domestic use and export; producing nuclear power; and storing radiological waste, including foreign spent reactor fuel. Given its enormous uranium reserves and current mining activities, some Australians have argued that Australia could benefit financially by expanding the mining sector and by adding value to its uranium exports by enriching the material and fabricating it into reactor fuel assemblies. Others have maintained that Australia can realize significant economic benefits by recycling and storing foreign spent fuel and producing carbon-free nuclear power. In the end, the commission recommended that Australia consider opening up a high-level waste repository to take in foreign spent fuel. It did not recommend any other nuclear activities at this time. The following viewpoint is based on testimony I delivered to the commission on the nuclear weapon proliferation implications of the proposed activities. If Australia wants to avoid the temptation of selling nuclear goods to states that might use these goods to make bombs, it should only consider new nuclear activities that can be entirely financed by the private sector and turn a profit without having to resort to foreign sales. This policy would also enable Australia to set an important, new international nonproliferation standard.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号