首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   429篇
  免费   29篇
  国内免费   11篇
  2023年   1篇
  2022年   3篇
  2021年   6篇
  2020年   7篇
  2019年   7篇
  2018年   8篇
  2017年   18篇
  2016年   13篇
  2015年   10篇
  2014年   45篇
  2013年   26篇
  2012年   29篇
  2011年   50篇
  2010年   44篇
  2009年   40篇
  2008年   25篇
  2007年   43篇
  2006年   15篇
  2005年   25篇
  2004年   10篇
  2003年   8篇
  2002年   9篇
  2001年   10篇
  2000年   6篇
  1999年   3篇
  1998年   1篇
  1997年   3篇
  1994年   1篇
  1993年   2篇
  1991年   1篇
排序方式: 共有469条查询结果,搜索用时 296 毫秒
91.
The profession of arms is distinct from other professions for many reasons. One reason which is not so obvious is that, unlike members of other professions, soldiers may go their entire careers preparing for a day that never arrives. All things considered, we should think this to be a very good thing. For soldiers, however, this can feel somewhat odd, since there is a natural desire to want to feel useful and to see one’s role and purpose find realization. Accordingly, the common soldier is forced to adopt a rather paradoxical mindset, one of longing for peace, and therefore for uselessness, while at the same time longing to be useful, which would entail that there be a war. This latter desire to be useful and to vindicate one’s identity as a soldier can sometimes take on an unhealthy life of its own. The pull of wanting too strongly to live up to a warrior identity, I argue, can sometimes skew a soldier’s ability to assess risk rationally. This article will therefore investigate how a soldier’s concept of self influences his or her overall capacity to evaluate risk in war and when such influence might become morally problematic.  相似文献   
92.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   
93.
In terrorism research, three different sources of information and data exist: the terrorists and their environment; the incidents; and the population. This article discusses the strengths and weaknesses of research that is concerned with, or relies on, any of the mentioned sources. An in-depth understanding of the methodological issues that come with these sources is important to correctly interpret results from scientific studies. It is highlighted how the different scientific approaches add to a holistic view of terrorism as a phenomenon. Furthermore, the double-edged sword of information in the field of terrorism is discussed. From these deliberations, guidance concerning the future work of both scholars and decision-makers can be deducted.  相似文献   
94.
《防务技术》2014,10(1):34-39
For the chip integration of MEMS (micro-electromechanical system) safety and arming device, a miniature detonator needs to be developed to reduce the weight and volume of explosive train. A Si-based micro-detonator is designed and fabricated, which meets the requirement of MEMS safety and arming device. The firing sensitivity of micro-detonator is tested according to GJB/z377A-94 sensitivity test methods: Langlie. The function time of micro-detonator is measured using wire probe and photoelectric transducer. The result shows the average firing voltage is 6.4 V when the discharge capacitance of firing electro-circuit is 33 μF. And the average function time is 5.48 μs. The firing energy actually utilized by Si-based micro-detonator is explored.  相似文献   
95.
重点介绍了某大型商业综合体内影院的消防设计方案,并进行烟气流动和人员疏散的数值模拟分析,得出该影院消防设计是安全可行的.为确保此类影院的消防安全,建议其疏散楼梯设计不受商场营业与否的影响,且应定期维护保养消防系统.  相似文献   
96.
根据消防实际工作经验,以某星级饭店为工程研究对象,就中庭式建筑的火灾危险性以及规范中关于中庭防火设计问题存在的不明确之处进行探讨,并提出了一些建议和解决对策.  相似文献   
97.
近年来,各地小型旅馆发展迅速,但由于其小而散使消防安全监管难度增大,从业人员消防安全意识淡薄,自身消防安全隐患较多,极易发生群死群伤火灾事故.介绍了小型旅馆的特点,分析了小型旅馆存在的消防安全隐患及消防监督管理工作存在的问题,探讨了加强小型旅馆消防安全管理的措施.  相似文献   
98.
随着公安消防部队灭火救援职能的不断拓展和训练内容的改革变化,官兵作战训练安全风险日益增大,伤亡事故逐年上升.分析案例、总结教训,虽有灾害事故复杂性等客观原因,但也暴露出作战训练中安全意识不强、制度不落实、组织指挥不当等内在因素,结合部队作战训练工作实际,深入剖析作战训练安全隐患、成因及对策,系统地研究作战训练安全管理的理论和方法,并提出实践中的可行性对策.  相似文献   
99.
随着大型超市的不断涌现,其消防安全问题越来越受到人们的关注。介绍了大型超市的概念,重点分析了大型超市的火灾危险性,从审验关口、安全疏散、消防设施、消防安全管理、灭火救援预案等方面提出了有针对性的消防安全对策。  相似文献   
100.
撬装式LNG加气站简便、灵活,具有易燃易爆危险性、工作环境特殊性等特点。目前关于撬装式LNG加气站没有明确的国家规范,因此探讨其消防安全设计至关重要。介绍了撬装式LNG加气站的优势,应用系统的思想方法,从总平面布局、防火间距、建(构)筑物设计、工艺安全设计、设置控制报警系统、电气安全设计、给排水系统设计、灭火器配置等方面探讨了撬装式LNG加气站的消防安全设计,为该种加气站的发展提供安全保障。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号