首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   391篇
  免费   225篇
  国内免费   82篇
化学   160篇
晶体学   52篇
力学   22篇
综合类   20篇
数学   19篇
物理学   115篇
无线电   310篇
  2024年   23篇
  2023年   42篇
  2022年   101篇
  2021年   82篇
  2020年   75篇
  2019年   61篇
  2018年   79篇
  2017年   81篇
  2016年   30篇
  2015年   41篇
  2014年   38篇
  2013年   21篇
  2012年   5篇
  2011年   6篇
  2010年   2篇
  2009年   2篇
  2007年   1篇
  2006年   1篇
  2005年   1篇
  1999年   2篇
  1995年   1篇
  1994年   1篇
  1959年   2篇
排序方式: 共有698条查询结果,搜索用时 31 毫秒
1.
赵深  何巍  辛璟焘  吕峥 《压电与声光》2023,45(4):589-594
光纤陀螺是惯导系统的重要组成器件,环境温度变化会造成光纤陀螺的零偏发生漂移,从而降低测量精度。运用传统的BP神经网络进行预测易陷入局部极小值,导致补偿失败。该文采用混沌模拟退火粒子群BP神经网络的光纤陀螺零偏温度补偿模型,优化了网络参数。通过在-40~60℃的升降温实验对模型进行验证,实验结果表明,该温度补偿模型的零偏稳定性比补偿前约有70%的精度提升,与以往BP模型相比,其预测性能和补偿效果更好。  相似文献   
2.
提出了一款应用于Ku波段的宽带高增益基片集成腔(Substrate Integrated Cavity,SIC)圆极化阵列天线。通过引入沿SIC口径面对角线放置的一对半月形寄生贴片和SIC底部馈电纵缝,使SIC中的TM_(211)和TM_(121)谐振模式幅值相等、相位相差90°,产生高增益圆极化辐射。同时,双寄生贴片还引入了一种背腔缝隙耦合振子圆极化辐射模式,扩宽了天线高增益圆极化辐射带宽。在此基础上,设计了一款2×2单元顺序旋转馈电的SIC圆极化阵列天线。阵列天线采用双层基片集成波导顺序相移馈电网络进行馈电,进一步增大了天线的圆极化带宽。综合考虑天线的-10 dB反射系数带宽、3 dB轴比带宽和3 dB增益带宽,测试结果表明,圆极化阵列天线的有效带宽为10.74-13.30 GHz(21.3%),在通带范围内最大增益为14.50 dBi。  相似文献   
3.
4.
极化干涉合成孔径雷达(PolInSAR)在城市遥感领域中扮演着重要角色。它能够提高图像的相干性并提高反演结果的精度,所以对于其散射机制的解释往往受到许多研究人员的关注。相关的研究多从极化分解的角度考虑,却少有人从散射中心高度方面进行分析。本文使用Ku波段无人机载极化干涉SAR系统,实现了使用无人机SAR系统对地面进行成像,比较了极化干涉最优分解与Pauli分解作用在不同人造目标时散射中心的关系。我们初步分析了极化干涉SAR的物理意义,并使用C波段的机载极化干涉SAR系统对结论进行验证。  相似文献   
5.
经过20多年的完善与发展,喷墨技术已经成为大幅面广告印刷行业的主要印刷技术。随着图书按需印刷需求的快速扩张以及国家环保政策的迅速落地,喷墨印刷技术作为一项高效环保的数字化印刷技术,得到越来越高的关注,业内普遍认为喷墨印刷技术将是数字化印刷的必然发展趋势。然而与已经成熟的多Pass喷墨印刷设备不同,单Pass喷墨印刷设备在数据带宽、数据在线重构、高精度同步控制、喷嘴在线补偿等方面有着极高的技术要求。本文首先简要介绍了喷墨技术,然后针对单Pass喷墨印刷设备需要解决的技术问题提出了相应的解决方案。依据本文技术设计的单Pass书刊喷墨印刷机已经投放市场,并且获得了用户的普遍认可。  相似文献   
6.
HTML5 application cache (AppCache) allowed Web browser to access Web offline.But it also brought a new method of cache poisoning attack that was more persisting.As for websites which used the AppCache,a novel poisoning method RFTM (replace file twice method),in which the attacker replaced the manifest file twice to poison the client’s AppCache,was proposed.Compared with the original attack,the legal server would not receive abnormal HTTP requests from the client in the attack.Therefore,changing the server configuration could not prevent the client from the RFTM AppCache poisoning.To avoid the attack mentioned above,a lightweight signature defense scheme Sec-Cache in application layer was designed.Furthermore,experiments show that it has good performance and compatibility.  相似文献   
7.
To detect copy-paste tampering, an im-proved SIFT (Scale invariant feature transform)-based al-gorithm was proposed. Maximum angle is defined and a maximum angle-based marked graph is constructed. The m arked graph feature vector is provided to each SIFT key point via discrete polar coordinate transformation. Key points are matched to detect the copy-paste tamper-ing regions. The experimental results show that the pro-posed algorithm can effectively identify and detect the ro-tated or scaled copy-paste regions, and in comparison with the methods reported previously, it is resistant to post-processing, such as blurring, Gaussian white noise and JPEG recompression. The proposed algorithm performs better than the existing algorithm to dealing with scaling transformation.  相似文献   
8.
This work discusses efficient and automated methods for constructing a set of representative resonance structures for arbitrary chemical species, including radicals and biradicals, consisting of the elements H, C, O, N, and S. Determining the representative reactive structures of chemical species is crucial for identification of reactive sites and consequently applying the correct reaction templates to generate the set of important reactions during automated chemical kinetic model generation. We describe a fundamental set of resonance pathway types, accounting for simple resonating structures, as well as global approaches for polycyclic aromatic species. Automatically discovering potential localized structures along with filtration to identify the representative structures was shown to be robust and relatively fast. The algorithms discussed here were recently implemented in the Reaction Mechanism Generator (RMG) software. The final structures proposed by this method were found to be in reasonable agreement with quantum chemical computation results of localized structure contributions to the resonance hybrid.  相似文献   
9.
10.
In this paper, the author concerns two trace Trudinger-Moser inequalities and obtains the corresponding extremal functions on a compact Riemann surface (Σ, g) with smooth boundary ?Σ. Explicitly, let λ1(?Σ) = inf u∈W1,2 (Σ,g),R ?Σ udsg=0,u6≡0 R Σ(|?gu|2 + u2 )dvg R ?Σ u2 dsg and H = n u ∈ W1,2 (Σ, g) : Z Σ(|?gu|2 + u2 )dvg ? α Z ?Σ u2dsg ≤ 1 and Z ?Σ u dsg = 0o ,where W1,2 (Σ, g) denotes the usual Sobolev space and ?g stands for the gradient operator.By the method of blow-up analysis, we obtain sup u∈H Z ?Σ e πu2 dsg ( < +∞, 0 ≤ α < λ1(?Σ),= +∞, α ≥ λ1(?Σ).Moreover, the author proves the above supremum is attained by a function uα ∈ H∩C∞(Σ)for any 0 ≤ α < λ1(?Σ). Further, he extends the result to the case of higher order eigenvalues. The results generalize those of [Li, Y. and Liu, P., Moser-Trudinger inequality on the boundary of compact Riemannian surface, Math. Z., 250, 2005, 363–386], [Yang,Y., Moser-Trudinger trace inequalities on a compact Riemannian surface with boundary,Pacific J. Math., 227, 2006, 177–200] and [Yang, Y., Extremal functions for TrudingerMoser inequalities of Adimurthi-Druet type in dimension two, J. Diff. Eq., 258, 2015,3161–3193]  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号