首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1340篇
  免费   462篇
  国内免费   89篇
  1891篇
  2024年   4篇
  2023年   3篇
  2022年   24篇
  2021年   27篇
  2020年   27篇
  2019年   20篇
  2018年   18篇
  2017年   64篇
  2016年   73篇
  2015年   66篇
  2014年   86篇
  2013年   147篇
  2012年   163篇
  2011年   165篇
  2010年   72篇
  2009年   66篇
  2008年   68篇
  2007年   76篇
  2006年   107篇
  2005年   107篇
  2004年   93篇
  2003年   79篇
  2002年   41篇
  2001年   56篇
  2000年   63篇
  1999年   37篇
  1998年   25篇
  1997年   16篇
  1996年   19篇
  1995年   15篇
  1994年   10篇
  1993年   7篇
  1992年   12篇
  1991年   11篇
  1990年   14篇
  1989年   9篇
  1988年   1篇
排序方式: 共有1891条查询结果,搜索用时 0 毫秒
831.
为了获得毫米级自旋小目标的清晰成像,采用逆合成孔径成像激光雷达技术设计了基于距离向数据与方位向数据相融合的图像重建系统。系统采用大带宽、窄线宽光纤激光器配合调制器实现激光脉冲的线性调频,利用光外差原理对回波信号进行采集处理。结合自旋目标的运动特性,给出了含有自旋分量的回波信号函数方程,并将该分量引入传统的R-D算法中实现了对自旋目标的ISAIL二维图像的重建。实验采用毫米级铝条构成被测小目标,通过步进电机及带倾角的转台完成运动及自旋模拟。实验结果显示,当目标固定时,可通过回波能量数据获得一维距离向图像,与被测目标的4个特征点位置一致。当目标运动时,通过数据压缩并代入自旋参量,最后通过R-D算法可以获得可识别的ISAIL二维图像,验证了系统符合自旋小目标成像的设计要求。  相似文献   
832.
基于手势的人机交互方式可大大提高人对计算机系统的控制能力,实现人机自然融合。首先,简要分析了Leap Motion设备进行手势识别的特点,详细阐述了利用Unity3D构建三维电子沙盘的方法和流程,在此基础上提出了基于手势交互的三维电子沙盘系统集成技术框架;然后,设计了基于Leap Motion的手势识别方案和控制脚本的基本流程,最后搭建系统实例并进行测试。测试结果表明,通过Leap Motion可实现人手对沙盘系统的预定操作,为这种新型手势识别技术的应用提供了一定借鉴。  相似文献   
833.
The jus ad bellum criterion of right intention (CRI) is a central guiding principle of just war theory. It asserts that a country’s resort to war is just only if that country resorts to war for the right reasons. However, there is significant confusion, and little consensus, about how to specify the CRI. We seek to clear up this confusion by evaluating several distinct ways of understanding the criterion. On one understanding, a state’s resort to war is just only if it plans to adhere to the principles of just war while achieving its just cause. We argue that the first understanding makes the CRI superfluous, because it can be subsumed under the probability of success criterion. On a second understanding, a resort to war is just only if a state’s motives, which explain its resort to war, are of the right kind. We argue that this second understanding of the CRI makes it a significant further obstacle to justifying war. However, this second understanding faces a possible infinite regress problem, which, left unresolved, leaves us without a plausible interpretation of the CRI. This constitutes a significant and novel reason for leaving the CRI out of the international law of armed conflict (LOAC).  相似文献   
834.
The USA is currently facing an increasingly diverse range of threats, including non-state actors, particularly violent extremist organizations attempting to do harm. The national leadership has made it clear that for the near future it will employ Special Operations Forces (SOF) as the tool of choice in short-duration, high-intensity operations that have more in common with the battle of Takur Ghar, than those with a larger footprint. It is critical then that the lessons of the past are learnt now and are applied before employing SOF in the future. This becomes especially important given the short lead-time in concert with the short-duration/high-intensity tempo of their operations. In the Battle of Takur Ghar, during Operation Anaconda, rigid adherence to the joint functions, especially clearer and more robust Command and Control (C2) and Intelligence, Surveillance, and Reconnaissance (ISR) in the planning and execution of Operation Anaconda would have yielded a better operational outcome and saved lives. With the benefit of hindsight, many things could have been done differently, but several key issues stand out. The C2 structure must include all components from the outset to synchronize effects and rapidly re-task ISR. There must be multiple communications redundancies and adequate bandwidth. Finally, all SOF, conventional and interagency capabilities must be synchronized under one task force commander with a sufficiently robust C2 infrastructure to direct the entire effort. As our nation calls on SOF at an ever-increasing rate, we must take those lessons learned and apply them to future operations.  相似文献   
835.
Boko Haram (BH) is an insurgent group that operates mainly in northeastern Nigeria. Its stated aim is to establish an Islamic state, and it employs terrorism as its strategy. Earlier interests of security analysts centred on the drivers of BH uprising and the possibility of its internationalisation. Today's concerns relate more to why the rebellion has lasted this long. In toeing the same line, this article demonstrates that BH is a purposive terror group against which the government has evolved no viable strategy. It examines some gains of BH over the past six years and how it benefitted from the government's underestimation of its capacity and determination. It concludes that to effectively engage BH, the Nigerian government must revaluate its threat and sincerely pursue an expanded strategy beyond the current military-centric approach. To be effective, government's response must be packaged in such a way as to enhance human security in the region.  相似文献   
836.
This article studies the inventory competition under yield uncertainty. Two firms with random yield compete for substitutable demand: If one firm suffers a stockout, which can be caused by yield failure, its unsatisfied customers may switch to its competitor. We first study the case in which two competing firms decide order quantities based on the exogenous reliability levels. The results from the traditional inventory competition are generalized to the case with yield uncertainty and we find that quantity and reliability can be complementary instruments in the competition. Furthermore, we allow the firms to endogenously improve their yield reliability before competing in quantity. We show that the reliability game is submodular under some assumptions. The results indicate that the competition in quantity can discourage the reliability improvement. With an extensive numerical study, we also demonstrate the robustness of our analytical results in more general settings. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 107–126, 2015  相似文献   
837.
以经典扩跳频抗干扰通信技术为切入点,综述了外军短波、超短波战术通信和数据链领域抗干扰装备和技术的发展现状,在此基础上,对通信抗干扰技术未来发展趋势进行了分析和预测。  相似文献   
838.
针对具有相同结构功能的装备群系统可靠性评估问题,根据任务周期内对装备完好数的要求,合理表示了系统状态转移过程。以部件任务期间状态变化为研究对象,将系统等效表示为多阶段任务系统,即串行k/N(G)系统。在确定系统可行状态过程基础上,分别建立了部件寿命分布在3种不同情形下的系统任务可靠性模型,并分析了备件冷储备方案的影响。为确定系统任务期间备件携带量提供决策支持,最后给出了一个应用实例。  相似文献   
839.
提出一种在威胁环境下应用A*算法进行目标跟踪的方法。为了简化模型和便于分析,主要考虑地形和雷达威胁。在考虑了雷达盲区的安全区域内,利用目标的实时信息和改进后的A*算法对无人机航迹进行规划,以达到跟踪地面移动目标的目的。仿真结果表明,所提出的方法可以很好地实现目标跟踪。  相似文献   
840.
对角加载MVDR技术是一种经典的空间谱估计技术,在水声阵列信号处理中有着广泛的应用。该技术之所以具有较好的性能是由于其通过对角加载使样本协方差矩阵的特征值分散度减小。提出了基于随机矩阵理论的MVDR空间谱估计技术,具体思路是利用随机矩阵特征值的极限性质实现样本协方差矩阵噪声的抑制,以达到类似对角加载能够实现的特征值分散度减小的效果。仿真表明所提出的方法与对角加载方法达到了同样的目的,且当快拍数一定,而信噪比由小变大时,该方法可以达到与对角加载MVDR技术相当的性能;当信噪比设为定值,快拍数由小变大时,其与对角加载技术具有相同的DOA估计成功概率变化趋势,且在小样本情况下,此方法优势较为明显。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号