首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1740篇
  免费   630篇
  国内免费   262篇
  2632篇
  2024年   7篇
  2023年   19篇
  2022年   20篇
  2021年   39篇
  2020年   39篇
  2019年   38篇
  2018年   26篇
  2017年   102篇
  2016年   150篇
  2015年   89篇
  2014年   157篇
  2013年   160篇
  2012年   156篇
  2011年   131篇
  2010年   107篇
  2009年   159篇
  2008年   101篇
  2007年   140篇
  2006年   171篇
  2005年   142篇
  2004年   117篇
  2003年   87篇
  2002年   66篇
  2001年   73篇
  2000年   43篇
  1999年   48篇
  1998年   41篇
  1997年   37篇
  1996年   28篇
  1995年   26篇
  1994年   25篇
  1993年   22篇
  1992年   22篇
  1991年   18篇
  1990年   19篇
  1989年   5篇
  1987年   2篇
排序方式: 共有2632条查询结果,搜索用时 15 毫秒
771.
提出了一种对匀速扫描雷达的单站被动定位方法 ,主要论述了该定位方法的数学模型 ,仿真分析结果表明该算法有较好的定位精度  相似文献   
772.
协同空战的最小共享信息集   总被引:10,自引:2,他引:10  
首先提出了最小共享信息集的概念。然后 ,提出了作战飞机的智能系统模型。从它入手 ,分析了协同空战的信息 ,提出了确定协同空战的最小共享信息集的事件法 ,并应用信息论证明了事件法的确能够减少通信的信息量。在上述基础上 ,确定了超视距空对空协同作战的最小共享信息集 ;仿真结果验证了它的合理性  相似文献   
773.
磁性目标的高精度建模方法   总被引:15,自引:2,他引:15  
以混合阵列模型为例 ,研究了磁性目标的高精度磁场建模方法 ,并设计测试实验 ,对用该方法建立的磁场模型的稳定可靠性进行了测试 .测试结果表明 ,用该方法建立的磁场模型不仅精度高而且稳定可靠  相似文献   
774.
为了对系统建模技术有一个总体认识,本文采用归纳和分析的方法,对系统建模技术的体系结构进行了初步探讨。  相似文献   
775.
常系数投资消费模型中资产折算函数常用   总被引:1,自引:0,他引:1  
在有交易费的常系数投资消费模型下,讨论了资产折算的一个重要的基本性质,即给出了资产折算函数是变分不等式的粘性上解这一基本结果。  相似文献   
776.
PSpice模型用于电爆炸丝的数值模拟   总被引:6,自引:1,他引:6       下载免费PDF全文
根据细铜丝通过大电流时发生爆炸而导致电阻率的急剧变化的实验数据,建立了其PSpcie电路模型。然后将这个模型应用于一个含电爆炸丝断路开关的电感储能脉冲功率电路,以探讨电爆炸丝的参数选择对脉冲功率调制系统的影响。研究表明电爆炸丝长度主要控制电流切断的效果,而电爆炸丝的根数或截面积主要控制电爆炸丝切断的时刻,并且初始电压愈大,切断愈迅速,在负载上获得更高的电压。这些结论可以较好地解释实验结果。  相似文献   
777.
This paper investigates the multivariate Polya distribution (MPD) for application in combat models for which enemy targets must be randomly assigned to fighting units. Six sets of actual combat data motivate the allocation model. Scenarios include air‐to‐air combat, tank, and submarine warfare. Goodness of fit tests are derived which verify the validity of the MPD, and reinforce the notion that multinomial allocation is too simplistic for such combat models. Simulations to determine optimal allocations for minimal combat cost are applied in order to illustrate the role of the MPD in combat modeling. © 2001 John Wiley & Sons,Inc. Naval Research Logistics 48: 1–17, 2001  相似文献   
778.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014  相似文献   
779.
This paper provides a political economy analysis of the evolution of unmanned aerial vehicles (UAV), or ‘drones’ in the USA. Focus is placed on the interplay between the polity and private economic influences, and their impact on the trajectory of political, economic, and military outcomes. We identify the initial formation of the drone industry, trace how the initial relationships between the military and the private sector expanded over time, and discuss present relationships. Understanding the historical evolution of UAV technology, as well as the major players in the industry today, is important for ongoing policy debates regarding the use of drones both domestically and internationally.  相似文献   
780.
Secret French plans to launch guerrilla-style raids on the British Isles devised in the spring of 1796 were referred to as ‘chouanneries’. The name and concept behind these small-war operations were modelled on the irregular tactics used by the Chouan rebels in the Vendée, which the French state army had brutally quashed, but some wished to transfer into their institutional practice. Part of France's ongoing military strategy in the war against Britain, which included fomenting insurrection in Ireland, these irregular operations were to be manned partially by pardoned deserters and released convicts and prisoners of war. Of these, only Tate's brief invasion of Wales in 1797 was realised, but the surviving plans provide insightful historical lessons into an Anglophobic mindset shared by a small network of practitioners and policy deciders on the effectiveness of such shock and awe tactics. Largely motivated by the desire to take revenge for Britain's support of counter-revolutionaries in the Vendée, these plans could more aptly be referred to as counter-‘chouanneries’.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号