首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   388篇
  免费   113篇
  国内免费   20篇
  2024年   1篇
  2023年   5篇
  2022年   3篇
  2021年   9篇
  2020年   11篇
  2019年   8篇
  2018年   10篇
  2017年   20篇
  2016年   27篇
  2015年   15篇
  2014年   30篇
  2013年   30篇
  2012年   30篇
  2011年   38篇
  2010年   38篇
  2009年   43篇
  2008年   25篇
  2007年   32篇
  2006年   18篇
  2005年   21篇
  2004年   19篇
  2003年   13篇
  2002年   11篇
  2001年   13篇
  2000年   10篇
  1999年   6篇
  1998年   5篇
  1997年   6篇
  1996年   3篇
  1995年   3篇
  1994年   3篇
  1993年   4篇
  1992年   2篇
  1990年   5篇
  1989年   3篇
  1988年   1篇
排序方式: 共有521条查询结果,搜索用时 31 毫秒
141.
当前,领导干部经济责任审计风险的成因主要有外部原因和内部原因两个方面。防范经济责任审计风险,必须创造良好的审计环境,加强审计工作管理,努力提高审计人员的综合素质。  相似文献   
142.
为了解决目前装备在保障性方面存在的问题,给出了可操作性强而且实用的保障性风险识别与分析的技术与方法。该方法包括保障性风险区域的确定,保障性风险判断准则的建立,保障性风险的量化,保障性风险的评定等,为保障性风险管理提供了有效的方法和手段,从而为提高装备战备完好性和作战能力提供了有力支持。  相似文献   
143.
基于"姿态矩阵"量测的机载导弹传递对准技术   总被引:5,自引:0,他引:5  
"速度+姿态"量测匹配方案是目前比较理想的机载导弹传递对准技术.采用"姿态"量测时存在矩阵计算量大等缺点,在具体工程应用时更会受到计算机速度的限制,尤其是需要快速进行卡尔曼滤波计算时.引入了一种与"姿态"量测具有相同特点的"姿态矩阵"量测方案,设计了快速对准卡尔曼滤波器,并进行了仿真分析.结果表明是一种具有工程意义的实用快速传递对准技术.  相似文献   
144.
作战协同关系超图模型   总被引:1,自引:0,他引:1       下载免费PDF全文
在分析超图和作战协同相关概念基础上,采用形式化方式对抽象化的作战协同关系进行了描述,定义了协同关系矩阵,创新性地根据超图相关概念构建了作战协同超图模型,并根据模型定义了顶点度和关联系数等支持作战协同关系分析的特征参数。通过实验建立了某想定数据中的火力协同关系超图模型,并进行了度和关联系数的分析,实验结果证明了作战协同关系超图模型的可用性。  相似文献   
145.
矩阵变换器自抗扰控制策略研究   总被引:2,自引:0,他引:2  
矩阵变换器的输出电压易受各种因素的影响,为了改善输出性能,将自抗扰控制技术应用于矩阵变换器的闭环控制中。分析了自抗扰控制器的特性,提出了一种双闭环自抗扰控制策略,即电流内环与电压外环均采用一阶简化的自抗扰控制算法。仿真结果表明:该方法不仅可以有效地抑制多种扰动的影响,而且比PI控制具有更优的动静态性能,可满足高性能矩阵变换器系统的控制要求。  相似文献   
146.
The profession of arms is distinct from other professions for many reasons. One reason which is not so obvious is that, unlike members of other professions, soldiers may go their entire careers preparing for a day that never arrives. All things considered, we should think this to be a very good thing. For soldiers, however, this can feel somewhat odd, since there is a natural desire to want to feel useful and to see one’s role and purpose find realization. Accordingly, the common soldier is forced to adopt a rather paradoxical mindset, one of longing for peace, and therefore for uselessness, while at the same time longing to be useful, which would entail that there be a war. This latter desire to be useful and to vindicate one’s identity as a soldier can sometimes take on an unhealthy life of its own. The pull of wanting too strongly to live up to a warrior identity, I argue, can sometimes skew a soldier’s ability to assess risk rationally. This article will therefore investigate how a soldier’s concept of self influences his or her overall capacity to evaluate risk in war and when such influence might become morally problematic.  相似文献   
147.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   
148.
In terrorism research, three different sources of information and data exist: the terrorists and their environment; the incidents; and the population. This article discusses the strengths and weaknesses of research that is concerned with, or relies on, any of the mentioned sources. An in-depth understanding of the methodological issues that come with these sources is important to correctly interpret results from scientific studies. It is highlighted how the different scientific approaches add to a holistic view of terrorism as a phenomenon. Furthermore, the double-edged sword of information in the field of terrorism is discussed. From these deliberations, guidance concerning the future work of both scholars and decision-makers can be deducted.  相似文献   
149.
提出了信息化背景下边境安全风险情报分析的基本概念及其内涵,论述了信息化背景下边境安全风险分析系统的架构和面向边境安全风险分析的信息组织方式。  相似文献   
150.
针对校验矩阵形如准循环双对角阵的结构化LDPC码,对比研究了两类高效的编码算法:矩阵分解编码算法和分项累加递归编码算法,证明了两类算法从实现角度是等价的,但分项累加递归编码算法推导更为直观,且便于硬件并行实现。基于分项累加编码算法,提出了一种适合准循环双对角LDPC码的部分并行编码结构,设计实现了IEEE 802.11n标准中的LDPC码编码器。FPGA实现结果表明,所设计的LDPC编码器具有硬件开销较小、吞吐率高的优点,在码长为1944bit、码率为5/6时信息比特吞吐率最高可达13Gbps。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号