首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   274篇
  免费   19篇
  国内免费   7篇
  2023年   1篇
  2021年   6篇
  2020年   5篇
  2019年   4篇
  2018年   7篇
  2017年   13篇
  2016年   10篇
  2015年   6篇
  2014年   26篇
  2013年   19篇
  2012年   16篇
  2011年   28篇
  2010年   29篇
  2009年   30篇
  2008年   17篇
  2007年   28篇
  2006年   10篇
  2005年   14篇
  2004年   4篇
  2003年   7篇
  2002年   4篇
  2001年   8篇
  2000年   5篇
  1999年   3篇
排序方式: 共有300条查询结果,搜索用时 218 毫秒
51.
针对当前石化企业新技术、新工艺、新材料的不断应用,从典型化学反应入手分析了石化企业的火灾危险性,探讨了石化企业火灾特点,并将安全预评价和安全评价的理论方法引入到石油企业的安全防控中,结合石化企业的本质安全化建设,提出了安全对策,为新时期石化企业的火灾预防提供了理论依据。  相似文献   
52.
分析了地下停车库的火灾特点,并从停车库的火灾规模、发生轰燃的烟气条件、释放辐射热的大小、相邻汽车被引燃的临界条件和自动喷水系统的动作时间等几方面对停车库潜在的火灾危险性进行了探讨。以某地下一层停车库为例,对其火灾风险进行了具体评价。  相似文献   
53.
基于火灾风险分析的消防力量优化布局   总被引:2,自引:0,他引:2  
分析了我国目前消防力量布局存在的问题,从当前有限消防经费和现有的城市布局出发,提出了依据风险来优化消防力量布局的观点和方法,以最大限度的提高消防部队的灭火和抢险救援能力。  相似文献   
54.
贪污罪是指国家工作人员,侵吞、窃取、骗取或以其它手段非法占有公共财物,或受国家机关,国有公司、企事业单位、人民团体委托管理、经营国家财产的人员以上述手段非法占有国有财物的行为。深入开展反贪污腐败斗争,建立综合治理体系,是减少该类犯罪的有效手段。从贪污罪的犯罪构成、刑事政策等角度阐述新形势下贪污行为的本质与特点,并基于此提出自己的理性思考。  相似文献   
55.
化工企业火灾风险评估对于化工生产至关重要。针对化工行业的火灾风险,结合层次分析法和模糊识别模式的优点,提出了基于层次分析—模糊识别的综合评价方法,并通过实例评估证明了这种评价方法行之有效。  相似文献   
56.
57.
Assemble in Advance (AIA) policy reduces assembly cost due to advance planning, while Assemble to Order (ATO) policy eliminates assembly of excessive (more than demanded) units. The tradeoffs between the two policies have been studied in the past for single product environments. Moreover, it was shown that it is beneficial to employ AIA and ATO simultaneously. In this article, we study the employment of such a composite assembly policy in a multiproduct environment with component commonality. When common components are used, ATO may also enable us to benefit from the risk pooling effect. We provide important managerial insights such as: the multiperiod problem is myopic and changes in inventory levels due to the use of common components, and demonstrate the potential profit increase compared to other policies.© 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
58.
The profession of arms is distinct from other professions for many reasons. One reason which is not so obvious is that, unlike members of other professions, soldiers may go their entire careers preparing for a day that never arrives. All things considered, we should think this to be a very good thing. For soldiers, however, this can feel somewhat odd, since there is a natural desire to want to feel useful and to see one’s role and purpose find realization. Accordingly, the common soldier is forced to adopt a rather paradoxical mindset, one of longing for peace, and therefore for uselessness, while at the same time longing to be useful, which would entail that there be a war. This latter desire to be useful and to vindicate one’s identity as a soldier can sometimes take on an unhealthy life of its own. The pull of wanting too strongly to live up to a warrior identity, I argue, can sometimes skew a soldier’s ability to assess risk rationally. This article will therefore investigate how a soldier’s concept of self influences his or her overall capacity to evaluate risk in war and when such influence might become morally problematic.  相似文献   
59.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   
60.
In terrorism research, three different sources of information and data exist: the terrorists and their environment; the incidents; and the population. This article discusses the strengths and weaknesses of research that is concerned with, or relies on, any of the mentioned sources. An in-depth understanding of the methodological issues that come with these sources is important to correctly interpret results from scientific studies. It is highlighted how the different scientific approaches add to a holistic view of terrorism as a phenomenon. Furthermore, the double-edged sword of information in the field of terrorism is discussed. From these deliberations, guidance concerning the future work of both scholars and decision-makers can be deducted.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号