首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   801篇
  免费   292篇
  国内免费   111篇
  2024年   3篇
  2023年   8篇
  2022年   14篇
  2021年   5篇
  2020年   9篇
  2019年   16篇
  2018年   15篇
  2017年   45篇
  2016年   87篇
  2015年   39篇
  2014年   79篇
  2013年   87篇
  2012年   99篇
  2011年   81篇
  2010年   58篇
  2009年   67篇
  2008年   48篇
  2007年   65篇
  2006年   65篇
  2005年   50篇
  2004年   43篇
  2003年   31篇
  2002年   34篇
  2001年   33篇
  2000年   24篇
  1999年   11篇
  1998年   9篇
  1997年   13篇
  1996年   7篇
  1995年   7篇
  1994年   9篇
  1993年   12篇
  1992年   7篇
  1991年   11篇
  1990年   7篇
  1989年   5篇
  1988年   1篇
排序方式: 共有1204条查询结果,搜索用时 15 毫秒
341.
伴随高速可编程逻辑器件的广泛应用,实时快速可靠地对系统状态信号进行处理,实现对复杂机电系统运行状态的实时监控成为用户追求的目标。基于数字电位器由于可调精度高,控制方便,性能稳定等优点,给出了一种基于CPLD可编程器件,通过数字电位器实现在半实物仿真系统中对PT100热电阻的阻值变化进行等效模拟的工程应用。利用本研究内容,通过上位机界面对系统温度参数进行人工设定,即可轻易实现对PT100热电阻在不同温度下阻值的真实模拟,检验实际系统温度监测装置软硬件的可靠性,确保系统安全运行。  相似文献   
342.
大陆地区和台湾地区的刑事法律制度存在较大差异,必将影响海峡两岸共同合作打击跨境犯罪工作的开展。海峡两岸应在《海峡两岸共同打击犯罪及司法互助协议》框架下,在协商互信的基础上,本着对两岸刑事法律制度差异的清晰认识,采取合理、有效的刑事对策弱化其对两岸合作打击跨境犯罪的影响。  相似文献   
343.
火控雷达组网是应对未来末端防御作战挑战的有效途径。提出了基于指挥信息系统的火控雷达组网方式,并分析了该方式的优势。继而基于末端防御战斗部署一般要求和火控雷达组网系统对空侦察配系的特殊要求,经仿真计算得出和分析了火控雷达组网系统的典型对空侦察配系。最后详细论述了火控雷达组网系统的指挥控制要点。研究结果对于促进末端防御部队形成以信息系统为核心的体系作战能力具有重要意义。  相似文献   
344.
Secret French plans to launch guerrilla-style raids on the British Isles devised in the spring of 1796 were referred to as ‘chouanneries’. The name and concept behind these small-war operations were modelled on the irregular tactics used by the Chouan rebels in the Vendée, which the French state army had brutally quashed, but some wished to transfer into their institutional practice. Part of France's ongoing military strategy in the war against Britain, which included fomenting insurrection in Ireland, these irregular operations were to be manned partially by pardoned deserters and released convicts and prisoners of war. Of these, only Tate's brief invasion of Wales in 1797 was realised, but the surviving plans provide insightful historical lessons into an Anglophobic mindset shared by a small network of practitioners and policy deciders on the effectiveness of such shock and awe tactics. Largely motivated by the desire to take revenge for Britain's support of counter-revolutionaries in the Vendée, these plans could more aptly be referred to as counter-‘chouanneries’.  相似文献   
345.
对成像雷达的脉冲分段排序转发干扰   总被引:1,自引:1,他引:0       下载免费PDF全文
多假目标图像欺骗是目前宽带雷达干扰的难点。针对宽带雷达中常用的线性调频(Linear Frequency Modulated,LFM)信号,提出一种脉冲分段排序转发干扰方法。结合散射波信号模型,推导了合成干扰信号二维成像输出形式,讨论了假目标图像个数、分辨率与分段数以及转发次序之间的关系,并进行了仿真实验。结果表明该干扰方法可较便捷地产生多个沿距离向分布的假目标图像。结果对于成像雷达图像欺骗干扰具有理论指导意义。  相似文献   
346.
针对非相干背景光辐照二波耦合中参数的最佳匹配设计问题,提出了一种基于随机共振理论的研究方法。首先,文章通过二波耦合过程进行物理机理分析和数值实验分析,证明了该问题在本质上可归结为一种随机共振现象。其次,从随机共振的角度,研究其中的最佳参数设计问题,给出了一种分布处理的最优参数设计流程。按照该方法,在给定增益要求的情况下,先根据信号光饱和与否来确定晶体长度,最后根据非相干光的比例对增益的影响来确定非相干光的比例。仿真实验表明,经过最佳参数设计后,信号的增益和输出信噪比上均有显著提高。  相似文献   
347.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014  相似文献   
348.
This article modifies the associations made by historians and political scientists of Spanish guerrilla warfare with revolutionary insurgency. First, it explains how the guerrilla phenomenon moved from a Leftist to a reactionary symbol. Second, it compares the insurgency and counter-insurgency features of the Carlist War (1833–1840) with those of the better-known Peninsular War (1808–1814). Third, it shows how erstwhile guerrilla leaders during the Carlist War made their expertise available to the counter-insurgency, in a socio-economic as well as military setting. This article revises the social banditry paradigm in nineteenth-century Spain in the under-researched context of Europe bloodiest nineteenth-century civil war.  相似文献   
349.
针对跳频组网通信中不同信号间的时频分隔特点,利用时频重心进行目标方位数据关联,提出了空时频方位关联算法。根据提取的时频特征设计空时频测向的核函数,实现了简化的空时频测向算法。根据时频距离设计代价函数,基于匈牙利算法实现了方位关联结果的最优化二维分配。根据时频距离选择窗函数的类型和长度,有效避免了信号旁瓣泄露对测向精度的影响,显著提高了密集目标条件下的关联正确概率。数值仿真验证了上述观点。  相似文献   
350.
针对导弹靶场试验中的小子样问题,分析了自助法和随机加权法,并对自助法中再生子样较为集中的不足进行了改进。通过仿真比较得出,改进后的自助法具有更好的评定特性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号