全文获取类型
收费全文 | 506篇 |
免费 | 39篇 |
国内免费 | 35篇 |
出版年
2023年 | 1篇 |
2022年 | 2篇 |
2021年 | 7篇 |
2020年 | 10篇 |
2019年 | 7篇 |
2018年 | 9篇 |
2017年 | 28篇 |
2016年 | 37篇 |
2015年 | 18篇 |
2014年 | 43篇 |
2013年 | 31篇 |
2012年 | 37篇 |
2011年 | 42篇 |
2010年 | 38篇 |
2009年 | 43篇 |
2008年 | 25篇 |
2007年 | 46篇 |
2006年 | 32篇 |
2005年 | 33篇 |
2004年 | 14篇 |
2003年 | 19篇 |
2002年 | 11篇 |
2001年 | 14篇 |
2000年 | 8篇 |
1999年 | 5篇 |
1998年 | 3篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 6篇 |
1994年 | 5篇 |
1993年 | 2篇 |
1991年 | 1篇 |
排序方式: 共有580条查询结果,搜索用时 15 毫秒
121.
122.
123.
124.
125.
针对航空肼燃料保障安全评价的复杂性和非线性,提出并建立了基于BP和Hopfield神经网络的动态安全评价模型。在综合分析国内外肼燃料保障安全评价的基础上,针对航空肼燃料保障过程中出现的问题,构建并优化了指标体系,选取前馈神经网络中的BP网络和反馈神经网络中的Hopfield网络建立评价模型。在详细说明了BP和Hopfield神经网络的构建方法后,进行实例验证,并对预测效果进行了比较分析。仿真表明,两种模型都能正确评价安全保障状态。但在收敛速度、联想记忆功能方面Hopfield神经网络优于BP神经网络。将BP和Hopfield神经网络用于肼燃料保障安全评价过程中,具有适用性和可行性,对于航空肼燃料保障的安全建设与安全管理研究具有重要意义。 相似文献
126.
127.
128.
Michael Robillard 《Journal of Military Ethics》2017,16(3-4):205-219
The profession of arms is distinct from other professions for many reasons. One reason which is not so obvious is that, unlike members of other professions, soldiers may go their entire careers preparing for a day that never arrives. All things considered, we should think this to be a very good thing. For soldiers, however, this can feel somewhat odd, since there is a natural desire to want to feel useful and to see one’s role and purpose find realization. Accordingly, the common soldier is forced to adopt a rather paradoxical mindset, one of longing for peace, and therefore for uselessness, while at the same time longing to be useful, which would entail that there be a war. This latter desire to be useful and to vindicate one’s identity as a soldier can sometimes take on an unhealthy life of its own. The pull of wanting too strongly to live up to a warrior identity, I argue, can sometimes skew a soldier’s ability to assess risk rationally. This article will therefore investigate how a soldier’s concept of self influences his or her overall capacity to evaluate risk in war and when such influence might become morally problematic. 相似文献
129.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy. 相似文献
130.
Olive Emil Wetter 《Defense & Security Analysis》2014,30(2):92-105
In terrorism research, three different sources of information and data exist: the terrorists and their environment; the incidents; and the population. This article discusses the strengths and weaknesses of research that is concerned with, or relies on, any of the mentioned sources. An in-depth understanding of the methodological issues that come with these sources is important to correctly interpret results from scientific studies. It is highlighted how the different scientific approaches add to a holistic view of terrorism as a phenomenon. Furthermore, the double-edged sword of information in the field of terrorism is discussed. From these deliberations, guidance concerning the future work of both scholars and decision-makers can be deducted. 相似文献