首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3269篇
  免费   23篇
  国内免费   13篇
航空   1580篇
航天技术   1147篇
综合类   4篇
航天   574篇
  2021年   26篇
  2019年   23篇
  2018年   54篇
  2017年   51篇
  2016年   45篇
  2015年   26篇
  2014年   72篇
  2013年   92篇
  2012年   83篇
  2011年   121篇
  2010年   80篇
  2009年   137篇
  2008年   156篇
  2007年   100篇
  2006年   72篇
  2005年   92篇
  2004年   90篇
  2003年   100篇
  2002年   72篇
  2001年   115篇
  2000年   65篇
  1999年   68篇
  1998年   87篇
  1997年   59篇
  1996年   94篇
  1995年   112篇
  1994年   111篇
  1993年   50篇
  1992年   71篇
  1991年   34篇
  1990年   32篇
  1989年   76篇
  1988年   28篇
  1987年   25篇
  1986年   33篇
  1985年   90篇
  1984年   90篇
  1983年   65篇
  1982年   66篇
  1981年   99篇
  1980年   19篇
  1979年   25篇
  1978年   29篇
  1977年   27篇
  1975年   29篇
  1974年   23篇
  1973年   21篇
  1972年   20篇
  1969年   20篇
  1968年   18篇
排序方式: 共有3305条查询结果,搜索用时 359 毫秒
451.
It is argued that a systems engineering process that develops an understanding of end-user needs and economically develops a product system which includes the right technology advances to satisfy these needs is the best way to ensure success in the market of end-user needs. This customer pulled approach to new and improved products also pulls the necessary technology developments with it and integrates their timing and resource requirements into those of the end product planning. With appropriate concurrent, cross-functional teams working both the planning and the execution, this approach benefits from the wisdom and leadership of the end-user focused team to deliver the desired program results on schedule. This frees top leadership to focus on longer range visions for the product line and technologies  相似文献   
452.
This paper describes a security model developed from empirical data collected from a realistic intrusion experiment in which a number of undergraduate students were invited to attack a distributed computer system. Relevant data, with respect to their intrusion activities, were recorded continuously. We have worked out a hypothesis on typical attacker behavior based on experiences from this and other similar experiments. The hypothesis suggests that the attacking process can be split into three phases: the learning phase, the standard attack phase and the innovative attack phase. The probability for successful attacks during the learning phase is expected to be small and, if a breach occurs, it is rather a result of pure luck than deliberate action. During the standard attack phase, this probability is considerably higher, whereas it decreases again in the innovative attack phase. The collected data indicates that the breaches during the standard attack phase are statistically equivalent. Furthermore, the times between breaches seem to be exponentially distributed, which means that traditional methods for reliability modelling of component failures may be applicable  相似文献   
453.
E.A. Roth 《Acta Astronautica》1985,12(10):719-730
In this paper the Gaussian equations are derived for the nonsingular equinoctial elements, as they are required for dissipative perturbations of a satellite orbit. As examples, airdrag and solar radiation pressure are considered and the first-order variation of the elements and time after one revolution are given explicitly.  相似文献   
454.
This program will develop an automated and unmanned ultra-wide band (UWB) perimeter surveillance sensor designed to provide detection and tracking of personnel and vehicles at the perimeter of critical areas such as military installations and other such facilities. This effort describes the work being done for the protection of high value assets using a compact system which incorporates two technologies to enhance the probability of detection in stressing environments  相似文献   
455.
A study of the distribution of gain-to-noise-temperature (G/T) values for the Tracking and Data Relay Satellite (TDRS) satellite is described. The statistics of the G/T values are determined by a Monte Carlo simulation of the orbital geometry of the Sun and Moon, and the gain and noise temperature calculations is included. The results and their underlying assumptions are described  相似文献   
456.
An axis clinostat was constructed to create micro and negative gravity also a rotated flat disk was constructed with different rotation rates to give increased gravity, by centrifugal force up to 48 g. Rice seeds were grown on agar in tubes at the constant air temperature of 20 degrees C under an average light condition of 110 micromol/m2/sec(PPF). Humidity was not controlled but was maintained above 90%. Since the tube containers were not large enough for long cultivation, shoot and root growth were observed every 12 hours until the sixth day from seeding. The lengths of shoots and roots for each individual plant were measured on the last day. The stem lengths were increased by microgravity but the root lengths were not. Under the negative gravity, negative orthogeotropism and under microgravity, diageotropism was observed. No significant effect of increased gravity was observed on shoot and root growth.  相似文献   
457.
458.
459.
A technique of integral diagnostics for an RF inductively coupled plasma gas discharge unit of an ion thruster is proposed. This technique includes a priori measurements of antenna coil electrical parameters in free space and in assembled state as well as experimental determination of the antenna coil currents with and without discharge.  相似文献   
460.
An estimate of the feasibility of the ultrahigh-energy cosmic ray and neutrino detection using a lunar satellite-borne radio receiver is presented. The data obtained in the proposed experiment will make resolving the current contradictions in the ultrahigh-energy cosmic ray spectra measured with the major ground-based instruments possible. Moreover, they will enable us to considerably extend the accessible energy range and to check predictions of various models of the origin of the highest-energy particles in the Universe. At the same time the lunar radio detector provides a means of searching for ultrahigh-energy neutrinos with a high sensitivity combined with a very large target effective mass.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号