全文获取类型
收费全文 | 8635篇 |
免费 | 1276篇 |
国内免费 | 1179篇 |
专业分类
航空 | 6534篇 |
航天技术 | 1492篇 |
综合类 | 905篇 |
航天 | 2159篇 |
出版年
2024年 | 25篇 |
2023年 | 119篇 |
2022年 | 179篇 |
2021年 | 246篇 |
2020年 | 264篇 |
2019年 | 231篇 |
2018年 | 290篇 |
2017年 | 313篇 |
2016年 | 385篇 |
2015年 | 359篇 |
2014年 | 468篇 |
2013年 | 418篇 |
2012年 | 559篇 |
2011年 | 595篇 |
2010年 | 430篇 |
2009年 | 424篇 |
2008年 | 651篇 |
2007年 | 800篇 |
2006年 | 671篇 |
2005年 | 593篇 |
2004年 | 494篇 |
2003年 | 489篇 |
2002年 | 290篇 |
2001年 | 238篇 |
2000年 | 210篇 |
1999年 | 198篇 |
1998年 | 186篇 |
1997年 | 159篇 |
1996年 | 93篇 |
1995年 | 117篇 |
1994年 | 98篇 |
1993年 | 96篇 |
1992年 | 98篇 |
1991年 | 97篇 |
1990年 | 78篇 |
1989年 | 54篇 |
1988年 | 50篇 |
1987年 | 20篇 |
1986年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
992.
在SAR/INS组合导航系统中,由于合成孔径雷达采用正侧视成像工作方式,会引起SAR图像的严重变形,而且获取的SAR图像还可能存在严重的斑点噪声。为了适应SAR图像的几何畸变和高斑点噪声影响,需要提取出的图像特征具有较高的鲁棒性。本文提出了基于SURF的导航用鲁棒景象匹配算法,算法首先针对惯性组合导航的工作特点,对SURF特征匹配进行了改进和优化设计,然后用RANSAC方法过滤掉错误和低精度的匹配点,最后,进行最小二乘精确匹配获取航向和位置偏差信息。通过仿真分析了算法对SAR图像的适应性、抗斑点噪声性能,匹配精度以及实时性,并与基于SIFT特征的景象匹配算法进行了对比。仿真结果表明,所提出算法性能优越,在匹配适应性、鲁棒性、匹配精度及匹配速度方面都优于SIFT算法,可以满足SAR/INS组合导航系统图像匹配修正的高性能要求。 相似文献
993.
994.
Wang Daobo 《南京航空航天大学学报(英文版)》1994,(2)
ELECTRONICCONTROLOFTURBINEPOWERUNITS¥WangDaobo(DepartmentofScienceandTechnology,NUAA29YudaoStreet,Nanjing210016,P.R.China)Abs... 相似文献
995.
Jingjing ZHU Xiaojun WANG Haiguo ZHANG Yuwen LI Ruixing WANG Zhiping QIU 《中国航空学报》2019,32(9):2095-2108
Lightweight design is important for the Thermal Protection System(TPS) of hypersonic vehicles in that it protects the inner structure from severe heating environment. However, due to the existence of uncertainties in material properties and geometry, it is imperative to incorporate uncertainty analysis into the design optimization to obtain reliable results. In this paper, a six sigma robust design optimization based on Successive Response Surface Method(SRSM) is established for the TPS to improve the reliability and robustness with considering the uncertainties. The uncertain parameters related to material properties and thicknesses of insulation layers are considered and characterized by random variables following normal distributions. By employing SRSM, the values of objective function and constraints are approximated by the response surfaces to reduce computational cost. The optimization is an iterative process with response surfaces updating to find the true optimal solution. The optimization of the nose cone of hypersonic vehicle cabin is provided as an example to illustrate the feasibility and effectiveness of the proposed method. 相似文献
996.
997.
998.
999.
为寻求新能源配电网的可靠性和经济性最优,实现新能源电源的优化配置,本文提出将可靠性和经济性同时作为两个优化目标,运用自适应粒子群优化法,对新能源电源进行多目标优化配置。以IEEE-RBTS Bus 6主馈线F4为例,通过系统仿真找到新能源配电系统可靠性与经济较均衡的Pareto最优解集,可根据决策者的偏好选择最优方案。本文的研究为新能源电力系统可靠性和经济评估提供了一个新的研究思路。 相似文献
1000.
M. Naim A. Ali Pacha C. Serief 《Advances in Space Research (includes Cospar's Information Bulletin, Space Research Today)》2021,67(7):2077-2103
With the rapid growth of the number of Earth observation satellite (EOS) supporting critical applications, it is required to improve the security techniques to protect the sensitive data and images during the transmission between the satellites and the ground stations. This paper introduces a new satellite image encryption algorithm based on the Linear Feedback Shift Register (LFSR) generator, SHA 512 hash function, hyperchaotic systems, and Josephus problem. LFSR generates a matrix that is used to construct the 512-bits value of the hash function. These bits are used to set the initial values and parameters of the proposed encryption algorithm. Firstly, the six dimensions (6-D) hyperchaotic system is divided into three parts, where every two equations are considered as one part. Secondly, the 1-D hyperchaotic logistic-tent system is considered as the controller to select one part. The selected part is used to generate a matrix that is XORed with the original image. Thirdly, the scrambling operation by Josephus sequences is applied to the output of the previous step by scrambling the rows and the columns according to the selected part to produce the pre-encrypted image. Finally, if the number of iterations is less than the required number which is considered as a parameter of the secret key, the previous operations will be repeated in the pre-encrypted image; otherwise, the pre-encrypted image is considered as the final cipher image. Experimental and analyses results show that the proposed algorithm has good performance in terms of high level of security, large enough key-space, tolerance to Single Event Upsets (SEU) as well as low time complexity. 相似文献