首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   522篇
  免费   268篇
  国内免费   46篇
  2024年   7篇
  2023年   5篇
  2022年   16篇
  2021年   17篇
  2020年   21篇
  2019年   11篇
  2018年   9篇
  2017年   36篇
  2016年   37篇
  2015年   25篇
  2014年   45篇
  2013年   39篇
  2012年   51篇
  2011年   46篇
  2010年   37篇
  2009年   45篇
  2008年   34篇
  2007年   48篇
  2006年   58篇
  2005年   38篇
  2004年   31篇
  2003年   26篇
  2002年   28篇
  2001年   18篇
  2000年   21篇
  1999年   15篇
  1998年   12篇
  1997年   10篇
  1996年   6篇
  1995年   9篇
  1994年   8篇
  1993年   6篇
  1992年   6篇
  1991年   4篇
  1990年   5篇
  1989年   4篇
  1988年   1篇
  1987年   1篇
排序方式: 共有836条查询结果,搜索用时 31 毫秒
591.
车标作为车辆身份的关键特征之一,在车辆的监控与辨识中发挥着重要作用。由于自然场景复杂多变,对其中的车标进行准确识别仍具有很大的挑战性。目前公开数据库很少且存在诸多局限,导致研究缺乏可信度和实用性。本文建立了一个面向自然场景的全新数据集,包含多种采集环境下的10 324幅、67类车辆图像。基于此数据集开展应用研究,提出一个目标检测与深度学习相结合的车标识别方法,包括车标区域定位和车标种类预测两大步骤。实验表明,该方法对复杂背景有较强的适应性,在涉及30种车标的分类任务中达到89.0%的总体识别率。  相似文献   
592.
In this paper, based on a bidirectional parallel multi-branch feature pyramid network (BPMFPN), a novel one-stage object detector called BPMFPN Det is proposed for real-time detection of ground multi-scale targets by swarm unmanned aerial vehicles (UAVs). First, the bidirectional parallel multi-branch convolution modules are used to construct the feature pyramid to enhance the feature expression abilities of different scale feature layers. Next, the feature pyramid is integrated into the single-stage object detection framework to ensure real-time performance. In order to validate the effectiveness of the proposed algorithm, experiments are conducted on four datasets. For the PASCAL VOC dataset, the proposed algorithm achieves the mean average precision (mAP) of 85.4 on the VOC 2007 test set. With regard to the detection in optical remote sensing (DIOR) dataset, the proposed algorithm achieves 73.9 mAP. For vehicle detection in aerial imagery (VEDAI) dataset, the detection accuracy of small land vehicle (slv) targets reaches 97.4 mAP. For unmanned aerial vehicle detection and tracking (UAVDT) dataset, the proposed BPMFPN Det achieves the mAP of 48.75. Compared with the previous state-of-the-art methods, the results obtained by the proposed algorithm are more competitive. The experimental results demonstrate that the proposed algorithm can effectively solve the problem of real-time detection of ground multi-scale targets in aerial images of swarm UAVs.  相似文献   
593.
Liquid-filled compartment structure consists of a bulk steel plate with matrix blind holes which are filled with liquid and a steel front plate to seal up the liquid with rings and bolts.The liquid-filled compart-ment structure can resist the shaped charge warhead effectively.This paper presents experimental and theoretical investigations of the penetration ability of the residual shaped charge jet emerging from the liquid-filled compartment structure after the penetration process at different impact angles.On the basis of shock wave propagation theory,the influence of the liquid-filled compartment structure on jet sta-bility is analysed.The interferences of the liquid backflow caused by a reflected shock wave and a back plate on jet stability under different impact angles are also examined.In addition,the range of the disturbed velocity segments of the jet at different impact angles and the penetration ability of the re-sidual jet are obtained.A theoretical model is validated against the experimental penetration depths.  相似文献   
594.
The paper presents the possibilities of, and methods for, acquiring, analysing and processing optical signals in order to recognise, identify and counteract threats on the contemporary battleground. The main ways electronic warfare is waged in the optical band of the electromagnetic wave spectrum have been formulated, including the acquisition of optical emitter signatures, as well as ultraviolet (UV) and thermal (IR) signatures. The physical parameters and values describing the emission of laser radiation are discussed, including their importance in terms of creating optical signatures. Moreover, it has been shown that in the transformation of optical signals into signatures, only their spectral and temporal parameters can be applied. This was confirmed in experimental part of the paper, which includes our own measurements of spectral and temporal emission characteristics for three types of binocular laser rangefinders. It has been further shown that through simple registration and quick analysis involving comparison of emission time parameters in the case of UV signatures in “solar-blind” band, various events can be identified quickly and faultlessly. The same is true for IR signatures, where the amplitudes of the recorded signal for several wavelengths are compared. This was confirmed experimentally for UV signatures by registering and then analyzing signals from several events during military exercises at a training ground, namely Rocket Propelled Grenade (RPG) launches and explosions after hitting targets, trinitrotoluene (TNT) explosions, firing armour-piercing, fin-stabilised, discarding sabots (APFSDS) or high explosive (HE) projectiles. The final section describes a proposed model database of emitters, created as a result of analysing and transforming the recorded signals into optical signatures.  相似文献   
595.
The failure mechanism of a cylindrical shell cut into fragments by circumferential detonation collision was experimentally and numerically investigated. A self-designed detonation wave regulator was used to control the detonation and cut the shell. It was found that the self-designed regulator controlled the fragment shape. The macrostructure and micro-characteristics of fragments revealed that shear fracture was a prior mechanism, the shell fractured not only at the position of detonation collision, but the crack also penetrated the shell at the first contact position of the Chapmen-Jouguet (C-J) wave. The effects of groove number and outer layer thickness on the fracture behavior were tested by simulations. When the thickness of the outer layer was 5–18 mm, it has little effect on fragmentation of the shell, and shells all fractured at similar positions. The increase of the groove number reduced the fracture possibility of the first contact position of the C-J wave. When the groove number reached 7 with a 10 mm outer layer (1/4 model), the fracture only occurred at the position of detonation collision and the fragment width rebounded.  相似文献   
596.
《防务技术》2022,18(9):1662-1678
In current guidelines, the free air blast loads (overpressure and impulse) are determined by spherical charges, although most of ordnance devices are more nearly cylindrical than spherical in geometry. This may result in a great underestimation of blast loads in the near field and lead to an unsafe design. However, there is still a lack of systematic quantitative analysis of the blast loads generated from cylindrical charges. In this study, a numerical model is developed by using the hydrocode AUTODYN to investigate the influences of aspect ratio and orientation on the free air blast loads generated from center-initiated cylindrical charges. This is done by examining the pressure contours, the peak overpressures and impulses for various aspect ratios ranged from 1 to 8 and arbitrary orientation monitored along every azimuth angle with an interval of 5°. To characterize the distribution patterns of blast loads, three regions, i.e., the axial region, the vertex region and the radial region are identified, and the propagation of blast waves in each region is analyzed in detail. The complexity of blast loads of cylindrical charges is found to result from the bridge wave and its interaction with primary waves. Several empirical formulas are presented based on curve-fitting the numerical data, including the orientation where the maximum peak overpressure emerges, the critical scaled distance beyond which the charge shape effect could be neglected and blast loads with varied aspect ratio in arbitrary orientation, all of which are useful for blast-resistant design.  相似文献   
597.
通过建立了一般的空时CDMA系统模型 ,探讨多址干扰和多径效应的联合抑制问题。首先分析了系统的可辨识条件 ,然后利用多约束最优化准则研究了FIR空时解相关接收机设计和实现 ,并进一步分析了系统性能  相似文献   
598.
Honeypot系统是构建一个跟实际系统类似的网络陷阱,成为现有网络安全体系的重要补充手段。它可以诱惑攻击者将时间和资源都花费在攻击Honeypot上,从而保护真实工作系统免于攻击。它能监视和跟踪入侵者,收集入侵者的信息,以分析系统所面临的威胁,研究入侵者所用的入侵工具、策略和动机,在网络安全中起着主动防御的作用,是现有安全体系的重要补充。文章分析了构造Honeypot的分类及其优缺点,对Honeypot的实现软件进行比较,并指出了Honeypot系统存在的不足。  相似文献   
599.
基于最优未知输入观测器的BIT降虚警技术   总被引:1,自引:0,他引:1       下载免费PDF全文
针对基于模型的机电控制系统BIT中的虚警问题,分析了系统中的信息不确定性和产生虚警的机理,基于最优未知输入观测器方法设计了BIT故障检测诊断系统,该系统对信息不确定性具有较强的鲁棒性,能够充分地抑制虚警。在某机电跟踪与稳定伺服平台BIT系统上进行了试验研究,结果表明机理分析正确,所提方法有效。  相似文献   
600.
并行分布式检测网最优设计是复杂难解的,相同门限假定使I.I.D.网的设计极度简化,并在实际工程中广泛使用。本文研究了相同门限假定的合理性条件,为合理采用习惯性处理方法提供了理论依据。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号