首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   431篇
  免费   29篇
  国内免费   9篇
  2023年   1篇
  2022年   3篇
  2021年   6篇
  2020年   7篇
  2019年   7篇
  2018年   8篇
  2017年   18篇
  2016年   13篇
  2015年   10篇
  2014年   45篇
  2013年   26篇
  2012年   29篇
  2011年   50篇
  2010年   44篇
  2009年   40篇
  2008年   25篇
  2007年   43篇
  2006年   15篇
  2005年   25篇
  2004年   10篇
  2003年   8篇
  2002年   9篇
  2001年   10篇
  2000年   6篇
  1999年   3篇
  1998年   1篇
  1997年   3篇
  1994年   1篇
  1993年   2篇
  1991年   1篇
排序方式: 共有469条查询结果,搜索用时 15 毫秒
91.
近年来,汽车火灾形势日益严峻,严重威胁着人们的生命财产安全。因此,如何对大型客车火灾进行有效地风险防范,最大限度减少人员的伤亡和财产的损失有着非常重要的现实意义。针对大型客车自身结构的特点进行研究,就如何通过技术手段提高大型客车防火性能提出看法。  相似文献   
92.
土质隧洞围岩稳定性分析与设计计算方法探讨   总被引:5,自引:0,他引:5  
论述了以洞周位移量与围岩塑性区大小作为围岩稳定性经验判据的不足,依靠模型试验与力学计算,分析了隧洞破坏机理与形式。由此提出将基于有限元强度折减法求出的围岩安全系数作为稳定分析判据,这种判据有严格的力学依据,有统一的标准,而且不受其他因素的影响。研究了隧洞围岩安全系数(剪切安全系数、拉裂安全系数)与衬砌安全系数的算法以及隧洞设计计算方法。最后以黄土洞室为例,给出了土体隧洞设计计算新方法,并对土体隧洞今后的研究方向提出了几点展望。  相似文献   
93.
针对航空肼燃料保障安全评价的复杂性和非线性,提出并建立了基于BP和Hopfield神经网络的动态安全评价模型。在综合分析国内外肼燃料保障安全评价的基础上,针对航空肼燃料保障过程中出现的问题,构建并优化了指标体系,选取前馈神经网络中的BP网络和反馈神经网络中的Hopfield网络建立评价模型。在详细说明了BP和Hopfield神经网络的构建方法后,进行实例验证,并对预测效果进行了比较分析。仿真表明,两种模型都能正确评价安全保障状态。但在收敛速度、联想记忆功能方面Hopfield神经网络优于BP神经网络。将BP和Hopfield神经网络用于肼燃料保障安全评价过程中,具有适用性和可行性,对于航空肼燃料保障的安全建设与安全管理研究具有重要意义。  相似文献   
94.
为了保证机场运行安全,防止事故的发生,依据模糊物元分析理论,结合机场运行安全评价指标体系,构建了基于综合赋权的机场系统模糊物元安全评价模型。在该模型中,通过层次分析法和熵值法主客观综合所确定的权重,为指标体系进行线性加权,实现综合赋权,从而将计算得到的综合权重用于模糊物元建模与评价。实例分析结果表明,该模型步骤简单,过程科学合理,并兼顾了主客观因素的影响,评价结果总体反映了机场的真实安全水平,也为机场安全的科学评价提供了新思路。  相似文献   
95.
The profession of arms is distinct from other professions for many reasons. One reason which is not so obvious is that, unlike members of other professions, soldiers may go their entire careers preparing for a day that never arrives. All things considered, we should think this to be a very good thing. For soldiers, however, this can feel somewhat odd, since there is a natural desire to want to feel useful and to see one’s role and purpose find realization. Accordingly, the common soldier is forced to adopt a rather paradoxical mindset, one of longing for peace, and therefore for uselessness, while at the same time longing to be useful, which would entail that there be a war. This latter desire to be useful and to vindicate one’s identity as a soldier can sometimes take on an unhealthy life of its own. The pull of wanting too strongly to live up to a warrior identity, I argue, can sometimes skew a soldier’s ability to assess risk rationally. This article will therefore investigate how a soldier’s concept of self influences his or her overall capacity to evaluate risk in war and when such influence might become morally problematic.  相似文献   
96.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   
97.
In terrorism research, three different sources of information and data exist: the terrorists and their environment; the incidents; and the population. This article discusses the strengths and weaknesses of research that is concerned with, or relies on, any of the mentioned sources. An in-depth understanding of the methodological issues that come with these sources is important to correctly interpret results from scientific studies. It is highlighted how the different scientific approaches add to a holistic view of terrorism as a phenomenon. Furthermore, the double-edged sword of information in the field of terrorism is discussed. From these deliberations, guidance concerning the future work of both scholars and decision-makers can be deducted.  相似文献   
98.
《防务技术》2014,10(1):34-39
For the chip integration of MEMS (micro-electromechanical system) safety and arming device, a miniature detonator needs to be developed to reduce the weight and volume of explosive train. A Si-based micro-detonator is designed and fabricated, which meets the requirement of MEMS safety and arming device. The firing sensitivity of micro-detonator is tested according to GJB/z377A-94 sensitivity test methods: Langlie. The function time of micro-detonator is measured using wire probe and photoelectric transducer. The result shows the average firing voltage is 6.4 V when the discharge capacitance of firing electro-circuit is 33 μF. And the average function time is 5.48 μs. The firing energy actually utilized by Si-based micro-detonator is explored.  相似文献   
99.
重点介绍了某大型商业综合体内影院的消防设计方案,并进行烟气流动和人员疏散的数值模拟分析,得出该影院消防设计是安全可行的.为确保此类影院的消防安全,建议其疏散楼梯设计不受商场营业与否的影响,且应定期维护保养消防系统.  相似文献   
100.
根据消防实际工作经验,以某星级饭店为工程研究对象,就中庭式建筑的火灾危险性以及规范中关于中庭防火设计问题存在的不明确之处进行探讨,并提出了一些建议和解决对策.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号