全文获取类型
收费全文 | 2242篇 |
免费 | 670篇 |
国内免费 | 310篇 |
专业分类
3222篇 |
出版年
2024年 | 6篇 |
2023年 | 31篇 |
2022年 | 36篇 |
2021年 | 42篇 |
2020年 | 59篇 |
2019年 | 46篇 |
2018年 | 32篇 |
2017年 | 118篇 |
2016年 | 169篇 |
2015年 | 90篇 |
2014年 | 176篇 |
2013年 | 180篇 |
2012年 | 203篇 |
2011年 | 173篇 |
2010年 | 133篇 |
2009年 | 211篇 |
2008年 | 151篇 |
2007年 | 157篇 |
2006年 | 201篇 |
2005年 | 174篇 |
2004年 | 154篇 |
2003年 | 114篇 |
2002年 | 96篇 |
2001年 | 82篇 |
2000年 | 52篇 |
1999年 | 62篇 |
1998年 | 56篇 |
1997年 | 46篇 |
1996年 | 27篇 |
1995年 | 31篇 |
1994年 | 19篇 |
1993年 | 20篇 |
1992年 | 23篇 |
1991年 | 19篇 |
1990年 | 23篇 |
1989年 | 8篇 |
1987年 | 2篇 |
排序方式: 共有3222条查询结果,搜索用时 0 毫秒
161.
近十几年来,人们对机动目标的跟踪问题进行了大量研究。问题的核心是如何建立机动目标运动的数学模型。本文主要对现有的空中机动目标的数学模型进行评述和比较研究。 相似文献
162.
分析了单片可编程数字信号处理器的特性,并着重同普通微处理器、微控制器作了结构及性能上的比较。介绍了现有的DSP 并预测了DSP 在控制领域中的应用趋势。 相似文献
163.
坐标系与纯角度目标跟踪 总被引:1,自引:0,他引:1
纯角度目标跟踪问题一般包括二维纯方位跟踪和三维纯角度跟踪两种情形,其特性与所选用的坐标系有关。广泛采用的坐标系是直角坐标系(二维或三维)、极坐标系(二维)和球坐标系(三维)。本文分别在直角坐标系和改进的极坐标系下建立了二维系统模型,并进行了性能分析,指出了后者的优越性。在三维情况下,作了类似工作。最后还以二维问题为例,建立了机动目标跟踪的直角坐标模型和改进的极坐标模型。 相似文献
164.
Modern technology is producing high reliability products. Life testing for such products under normal use condition takes a lot of time to obtain a reasonable number of failures. In this situation a step‐stress procedure is preferred for accelerated life testing. In this paper we assume a Weibull and Lognormal model whose scale parameter depends upon the present level as well as the age at the entry in the present stress level. On the basis of that we propose a parametric model to the life distribution for step‐stress testing and suggest a suitable design to estimate the parameters involved in the model. A simulation study has been done by the proposed model based on maximum likelihood estimation. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2003 相似文献
165.
Today, many products are designed and manufactured to function for a long period of time before they fail. Determining product reliability is a great challenge to manufacturers of highly reliable products with only a relatively short period of time available for internal life testing. In particular, it may be difficult to determine optimal burn‐in parameters and characterize the residual life distribution. A promising alternative is to use data on a quality characteristic (QC) whose degradation over time can be related to product failure. Typically, product failure corresponds to the first passage time of the degradation path beyond a critical value. If degradation paths can be modeled properly, one can predict failure time and determine the life distribution without actually observing failures. In this paper, we first use a Wiener process to describe the continuous degradation path of the quality characteristic of the product. A Wiener process allows nonconstant variance and nonzero correlation among data collected at different time points. We propose a decision rule for classifying a unit as normal or weak, and give an economic model for determining the optimal termination time and other parameters of a burn‐in test. Next, we propose a method for assessing the product's lifetime distribution of the passed units. The proposed methodologies are all based only on the product's initial observed degradation data. Finally, an example of an electronic product, namely contact image scanner (CIS), is used to illustrate the proposed procedure. © 2002 Wiley Periodicals, Inc. Naval Research Logistics, 2003 相似文献
166.
Andrea Beccaro 《Small Wars & Insurgencies》2018,29(2):207-228
ISIS (the Islamic State of Iraq and Syria) has become a key political and military actor in the Middle East and in North Africa. This essay aims at outlining ISIS warfare through an analysis of its operations in the frame of hybrid warfare theory proposed by Frank Hoffman. Therefore, the paper deals with: the role of terrorist tactics in ISIS warfare and the relationship between terrorism and insurgency; ISIS use of technology, mainly with regard to suicide attacks and to drones; and the relevance of urban warfare. Finally, the paper highlights how ISIS operates and the most threatening features of its warfare. 相似文献
167.
An attacker‐defender model for analyzing the vulnerability of initial attack in wildfire suppression 下载免费PDF全文
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA. 相似文献
168.
《防务技术》2020,16(1):232-241
Operation architecture plays a more important role in Network Centric Warfare (NCW), which involves dynamic operation networks with complex properties. Thus, it is essential to investigate the operation architecture under the informatization condition within NCW and find a proper network construction method to efficiently coordinate various functional modules on a particular situation, i.e., the aerial combat. A new method integrating the physical level and functional level of NCW is proposed to establish the operation architecture, where the concept of network operation constraints unit and net constructing mechanisms are employed to avoid conflicts among different platforms. Meanwhile, we conduct simulations to assess the effectiveness and feasibility of the constructed operation architecture and analyze the influence of the network parameters. 相似文献
169.
《防务技术》2020,16(2):439-446
In order to study the cross-linking density and aging constitutive relationship of HTPB coating during storage, the thermal accelerated aging tests at 0%, 3%, 6% and 9% prestrains were carried out. The cross-linking density of HTPB coating at different aging stages were tested using low-field 1H NMR and the variation of cross-linking density was analyzed. The aging model of cross-linking density considering the chemical aging and the physical stretching factors was established. The uniaxial tensile tests were carried out on HTPB coating at different aging stages and the cross-linking density was introduced into Ogden hyperelastic constitutive model as a characterization parameter of correction coefficient. Combined with uniaxial tensile test results, a prestrain aging constitutive model of HTPB coating was established. The results show that the cross-linking density of HTPB coating increases rapidly at first and then slowly with the increase of thermal accelerated aging time without prestrain. Under prestrain conditions, the cross-linking density of HTPB coating decreases at the early stage, and increases rapidly at first and then slowly at the middle and late stages of thermal accelerated aging. The correlation coefficients of aging model of cross-linking density and aging constitutive model with test results are R > 0.9500 and R > 0.9900 respectively, which can be used to accurately describe the cross-linking density and aging constitutive relationship of HTPB coating under prestrain accelerated thermal aging conditions. 相似文献
170.