首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   58篇
  免费   6篇
  国内免费   2篇
  2020年   1篇
  2019年   1篇
  2018年   1篇
  2017年   7篇
  2016年   1篇
  2015年   2篇
  2014年   6篇
  2013年   10篇
  2012年   4篇
  2011年   2篇
  2010年   1篇
  2009年   3篇
  2008年   2篇
  2007年   7篇
  2006年   5篇
  2005年   1篇
  2004年   1篇
  2002年   3篇
  2001年   1篇
  2000年   3篇
  1999年   1篇
  1996年   2篇
  1990年   1篇
排序方式: 共有66条查询结果,搜索用时 55 毫秒
31.
浅谈Y2K     
Y2K(计算机2000年问题)的解决现在已迫在眉睫,文章在讲述 Y2K的产生及其危害的前提下,提出了Y2K的测试及解决办法,并阐述了我国目前在Y2K问题上的工作及成果。  相似文献   
32.
The phenomenon of the Boko Haram insurgency in Northern Nigeria has generated many security concerns. This article explores the implications of the Boko Haram insurgency in Northern Nigeria for internal security. The article, which relies on a study of secondary sources of data, reveals that the insurgency has spawned varied implications such as an international image crisis, huge economic losses, a health and humanitarian crisis, a huge burden on the security apparatuses, arms proliferation, and endangered national unity. It holds that the insurgency is essentially interlinked with a breakdown of the social contract manifested in opportunistic behavior, economic stagnation, and lack of functioning institutional mechanisms for policy conduct and conflict resolution. Owing to the security menace posed by the insurgency, the article recommends that the root causes of the insurgency should be tackled rather than relying on reactive measures that cannot guarantee enduring peace and internal security.  相似文献   
33.
ABSTRACT

The practice of dispatching teams of police advisors to other states to build or train foreign security forces began at the end of the nineteenth century, yet there exists no definitive history of the practice, or any definitive theoretical approach underpinning why such missions succeed or fail. Drawing upon their recent edited book on expeditionary police advising, and by examining the donor or sending states, the host nations, and the use of police in counterinsurgency situations, the authors present some key reasons why such missions fail, and lay some groundwork for additional study of this important subject.  相似文献   
34.
为了科学地指导DN150承插管线的使用与管理,采用非线性有限元法对带内腐蚀缺陷的DN150承插管线进行了剩余强度的评估。通过分析和计算,研究了腐蚀缺陷宽度、长度和深度对管线极限承载能力的影响。结果表明:腐蚀缺陷宽度对DN150承插管线的承载能力影响很小,可忽略不计;随着腐蚀缺陷长度的增加,管线的承载能力略微减小,当缺陷长度达到150mm,管道失效压力基本不变;随着腐蚀缺陷深度的增加,管道失效压力呈线性递减,其对管道失效压力的影响程度远远大于腐蚀缺陷长度。  相似文献   
35.
This article examines the recruitment and transportation of internally trafficked children from Benue State in the north-central geo-political zone of Nigeria to Oyo State in the south-western zone of Nigeria. The study is essentially qualitative: with the aid of the snowball sampling technique, in-depth interviews (IDIs) were conducted with drivers, employers and trafficking agents in two recipient communities in Ibadan. The findings show that human rights abuses manifest at the recruitment, transportation and destination phases. The human rights abuses include the recruitment of underage children for domestic work outside their immediate family environments; transportation under inhumane conditions; restriction of movement at traffickers' ‘warehouses’; non-disclosure of amount payable for the services of domestic servants by agents/traffickers; exclusion of domestic servants in wage negotiations; and violence by employers. In view of these, there is a need for the National Agency for the Prohibition of Trafficking in Persons to strengthen its internal trafficking campaign.  相似文献   
36.
讨论了受任意集中力、集中力偶和线性分布力作用的平面杆系结构内力分析技术.遍历单元的轴向和横向荷载特征点,生成该单元的“轴向荷载教组”和“横向荷载数组”,以此为基础,构造内力计算的“特征点截面法”和“特征点递推算法”,并进行了分析.分析结果表明:两种算法适合包含梯形分布的复杂荷载组合,是一种实用的平面杆系内力计算技术,可...  相似文献   
37.
从线性化的Euler方程和连续方程出发,采用线性自由面条件,通过傅里叶变换法研究水平运动点源在分层流体中产生的内波.利用源汇分布法分析运动潜体产生的lee波,采用稳定相法计算远场速度.计算结果表明,高模态内波的波域角小于低模态内波的波域角,内波的波域角小于Kelvin波的波域角;随航速增大lee波主要表现为散波.  相似文献   
38.
任务分配与调度中遗传算子的设计   总被引:7,自引:0,他引:7       下载免费PDF全文
应用遗传算法等进化方法进行任务分配与调度为越来越多的计算机学者们所关注。基于任务排列的知识表示 ,常规的标准遗传操作算子并不总是有效的。好的遗传算子对算法收敛性及收敛到好点是非常重要的。在列表编码的知识表示基础上 ,设计了三个有针对性的遗传算子 ,即改进的交配算子、内部交配算子和一种作为变异的迁移算子。模拟实验结果与分析表明这些算子对任务分配与调度是有效的。  相似文献   
39.
高等学校的内部管理体制改革,既是一个实践性很强的问题,也是一个理论问题。自改革开放以来,高校内部管理体制改革无论在局部还是在整体都在积极进行,并取得一些阶段性成果,这对于促进学校各项事业的发展起到了很大的推动作用。但随着改革的进一步深入,一些影响学校发展的问题也暴露出来了。本文着重从高校内部的领导体制改革、办学体制改革和人事制度改革等几个方面进一步深入探讨,以促进高校内部改革合理发展。  相似文献   
40.
The theory of population-centric counterinsurgency rests upon the untenable premise that the population within a theater of operations is fixed in place. By showing that people tend to move away from contested rural areas towards the relative safety and prosperity of counterinsurgent-controlled areas, this article demonstrates that this crucial premise is empirically false. Furthermore, a theory of counterinsurgent resource deployment, population movement, and incumbent strategic ineffectiveness is presented. Ultimately, the application of counterinsurgency resources actually dislocates the population from their place of residence and causes them to move into cities. When the urban areas' ability to absorb newcomers is overwhelmed, localized negative externalities emerge and can give rise to crime and insecurity. Such increased insecurity then creates an incentive for the counterinsurgency to retrench its resource use into the cities. As more physical territory is conceded to the insurgency, the relative strategic effectiveness of the counterinsurgency declines.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号