全文获取类型
收费全文 | 388篇 |
免费 | 113篇 |
国内免费 | 20篇 |
出版年
2024年 | 1篇 |
2023年 | 5篇 |
2022年 | 3篇 |
2021年 | 9篇 |
2020年 | 11篇 |
2019年 | 8篇 |
2018年 | 10篇 |
2017年 | 20篇 |
2016年 | 27篇 |
2015年 | 15篇 |
2014年 | 30篇 |
2013年 | 30篇 |
2012年 | 30篇 |
2011年 | 38篇 |
2010年 | 38篇 |
2009年 | 43篇 |
2008年 | 25篇 |
2007年 | 32篇 |
2006年 | 18篇 |
2005年 | 21篇 |
2004年 | 19篇 |
2003年 | 13篇 |
2002年 | 11篇 |
2001年 | 13篇 |
2000年 | 10篇 |
1999年 | 6篇 |
1998年 | 5篇 |
1997年 | 6篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 3篇 |
1993年 | 4篇 |
1992年 | 2篇 |
1990年 | 5篇 |
1989年 | 3篇 |
1988年 | 1篇 |
排序方式: 共有521条查询结果,搜索用时 31 毫秒
141.
当前,领导干部经济责任审计风险的成因主要有外部原因和内部原因两个方面。防范经济责任审计风险,必须创造良好的审计环境,加强审计工作管理,努力提高审计人员的综合素质。 相似文献
142.
143.
144.
在分析超图和作战协同相关概念基础上,采用形式化方式对抽象化的作战协同关系进行了描述,定义了协同关系矩阵,创新性地根据超图相关概念构建了作战协同超图模型,并根据模型定义了顶点度和关联系数等支持作战协同关系分析的特征参数。通过实验建立了某想定数据中的火力协同关系超图模型,并进行了度和关联系数的分析,实验结果证明了作战协同关系超图模型的可用性。 相似文献
145.
矩阵变换器自抗扰控制策略研究 总被引:2,自引:0,他引:2
矩阵变换器的输出电压易受各种因素的影响,为了改善输出性能,将自抗扰控制技术应用于矩阵变换器的闭环控制中。分析了自抗扰控制器的特性,提出了一种双闭环自抗扰控制策略,即电流内环与电压外环均采用一阶简化的自抗扰控制算法。仿真结果表明:该方法不仅可以有效地抑制多种扰动的影响,而且比PI控制具有更优的动静态性能,可满足高性能矩阵变换器系统的控制要求。 相似文献
146.
Michael Robillard 《Journal of Military Ethics》2017,16(3-4):205-219
The profession of arms is distinct from other professions for many reasons. One reason which is not so obvious is that, unlike members of other professions, soldiers may go their entire careers preparing for a day that never arrives. All things considered, we should think this to be a very good thing. For soldiers, however, this can feel somewhat odd, since there is a natural desire to want to feel useful and to see one’s role and purpose find realization. Accordingly, the common soldier is forced to adopt a rather paradoxical mindset, one of longing for peace, and therefore for uselessness, while at the same time longing to be useful, which would entail that there be a war. This latter desire to be useful and to vindicate one’s identity as a soldier can sometimes take on an unhealthy life of its own. The pull of wanting too strongly to live up to a warrior identity, I argue, can sometimes skew a soldier’s ability to assess risk rationally. This article will therefore investigate how a soldier’s concept of self influences his or her overall capacity to evaluate risk in war and when such influence might become morally problematic. 相似文献
147.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy. 相似文献
148.
Olive Emil Wetter 《Defense & Security Analysis》2014,30(2):92-105
In terrorism research, three different sources of information and data exist: the terrorists and their environment; the incidents; and the population. This article discusses the strengths and weaknesses of research that is concerned with, or relies on, any of the mentioned sources. An in-depth understanding of the methodological issues that come with these sources is important to correctly interpret results from scientific studies. It is highlighted how the different scientific approaches add to a holistic view of terrorism as a phenomenon. Furthermore, the double-edged sword of information in the field of terrorism is discussed. From these deliberations, guidance concerning the future work of both scholars and decision-makers can be deducted. 相似文献
149.
唐超 《中国人民武装警察部队学院学报》2014,(11):22-26
提出了信息化背景下边境安全风险情报分析的基本概念及其内涵,论述了信息化背景下边境安全风险分析系统的架构和面向边境安全风险分析的信息组织方式。 相似文献
150.
针对校验矩阵形如准循环双对角阵的结构化LDPC码,对比研究了两类高效的编码算法:矩阵分解编码算法和分项累加递归编码算法,证明了两类算法从实现角度是等价的,但分项累加递归编码算法推导更为直观,且便于硬件并行实现。基于分项累加编码算法,提出了一种适合准循环双对角LDPC码的部分并行编码结构,设计实现了IEEE 802.11n标准中的LDPC码编码器。FPGA实现结果表明,所设计的LDPC编码器具有硬件开销较小、吞吐率高的优点,在码长为1944bit、码率为5/6时信息比特吞吐率最高可达13Gbps。 相似文献