首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7661篇
  免费   359篇
  国内免费   126篇
管理学   817篇
民族学   14篇
人才学   1篇
人口学   109篇
丛书文集   263篇
理论方法论   130篇
综合类   2085篇
社会学   330篇
统计学   4397篇
  2024年   12篇
  2023年   88篇
  2022年   107篇
  2021年   155篇
  2020年   196篇
  2019年   311篇
  2018年   356篇
  2017年   482篇
  2016年   328篇
  2015年   272篇
  2014年   367篇
  2013年   1288篇
  2012年   514篇
  2011年   340篇
  2010年   296篇
  2009年   284篇
  2008年   329篇
  2007年   337篇
  2006年   300篇
  2005年   294篇
  2004年   261篇
  2003年   198篇
  2002年   148篇
  2001年   155篇
  2000年   148篇
  1999年   109篇
  1998年   99篇
  1997年   66篇
  1996年   55篇
  1995年   52篇
  1994年   40篇
  1993年   23篇
  1992年   37篇
  1991年   17篇
  1990年   16篇
  1989年   15篇
  1988年   13篇
  1987年   10篇
  1986年   6篇
  1985年   7篇
  1984年   7篇
  1983年   5篇
  1981年   2篇
  1980年   1篇
排序方式: 共有8146条查询结果,搜索用时 31 毫秒
41.
Summary.  Factor analysis is a powerful tool to identify the common characteristics among a set of variables that are measured on a continuous scale. In the context of factor analysis for non-continuous-type data, most applications are restricted to item response data only. We extend the factor model to accommodate ranked data. The Monte Carlo expectation–maximization algorithm is used for parameter estimation at which the E-step is implemented via the Gibbs sampler. An analysis based on both complete and incomplete ranked data (e.g. rank the top q out of k items) is considered. Estimation of the factor scores is also discussed. The method proposed is applied to analyse a set of incomplete ranked data that were obtained from a survey that was carried out in GuangZhou, a major city in mainland China, to investigate the factors affecting people's attitude towards choosing jobs.  相似文献   
42.
在考虑了操作机的关节极限、自碰撞和静态障碍物的情况下,从给定的初始位形出发,发现一条到末端效应器目标位置和姿态的相连可到达路径。方法给出了机器人操作机点到点逆运动学问题求解算法,利用碰撞算法实现了冗余度机器人运动规划,仿真验证了该方法的有效性,并表明了该方法具有较大的实用价值。  相似文献   
43.
研究了一种客户动态、静态属性数据相结合的客户分类方法。提出了客户时间序列的加权处理方法,并应用客户时间序列的统计特征作为聚类特征向量,采用混合式遗传算法对客户聚类,使每一类客户具有相似的时序特征。在此基础上将聚类结果与客户的静态属性数据相结合,对客户进一步分类。实验结果表明,与传统的基于静态属性数据的客户分类方法相比,本文的方法提高了客户分类的准确性。  相似文献   
44.
提出了一种基于移动代理的新型分布式入侵检测系统。该系统是针对广域网环境专门设计的,数据的处理通过各节点所设置的代理来进行分布式计算,不仅能实现全网络范围内的入侵检测功能,具有良好的可移植性;而且对网络系统和主机的资源占用较低,减少了出现网络瓶颈的可能。还建立了移动代理的新型分布式入侵检测系统的体系结构和理论分析模型,并讨论了该系统的维护更新机制。  相似文献   
45.
Longitudinal data often contain missing observations, and it is in general difficult to justify particular missing data mechanisms, whether random or not, that may be hard to distinguish. The authors describe a likelihood‐based approach to estimating both the mean response and association parameters for longitudinal binary data with drop‐outs. They specify marginal and dependence structures as regression models which link the responses to the covariates. They illustrate their approach using a data set from the Waterloo Smoking Prevention Project They also report the results of simulation studies carried out to assess the performance of their technique under various circumstances.  相似文献   
46.
Point processes are the stochastic models most suitable for describing physical phenomena that appear at irregularly spaced times, such as the earthquakes. These processes are uniquely characterized by their conditional intensity, that is, by the probability that an event will occur in the infinitesimal interval (t, t+Δt), given the history of the process up tot. The seismic phenomenon displays different behaviours on different time and size scales; in particular, the occurrence of destructive shocks over some centuries in a seismogenic region may be explained by the elastic rebound theory. This theory has inspired the so-called stress release models: their conditional intensity translates the idea that an earthquake produces a sudden decrease in the amount of strain accumulated gradually over time along a fault, and the subsequent event occurs when the stress exceeds the strength of the medium. This study has a double objective: the formulation of these models in the Bayesian framework, and the assignment to each event of a mark, that is its magnitude, modelled through a distribution that depends at timet on the stress level accumulated up to that instant. The resulting parameter space is constrained and dependent on the data, complicating Bayesian computation and analysis. We have resorted to Monte Carlo methods to solve these problems.  相似文献   
47.
Oiler, Gomez & Calle (2004) give a constant sum condition for processes that generate interval‐censored lifetime data. They show that in models satisfying this condition, it is possible to estimate non‐parametrically the lifetime distribution based on a well‐known simplified likelihood. The author shows that this constant‐sum condition is equivalent to the existence of an observation process that is independent of lifetimes and which gives the same probability distribution for the observed data as the underlying true process.  相似文献   
48.
Summary.  The pattern of absenteeism in the downsizing process of companies is a topic in focus in economics and social science. A general question is whether employees who are frequently absent are more likely to be selected to be laid off or in contrast whether employees to be dismissed are more likely to be absent for the remaining time of their working contract. We pursue an empirical and microeconomic investigation of these theses. We analyse longitudinal data that were collected in a German company over several years. We fit a semiparametric transition model based on a mixture Poisson distribution for the days of absenteeism per month. Prediction intervals are considered and the primary focus is on the period of downsizing. The data reveal clear evidence for the hypothesis that employees who are to be laid off are more frequently absent before leaving the company. Interestingly, though, no clear evidence is seen that employees being selected to leave the company are those with a bad absenteeism profile.  相似文献   
49.
In this paper we discuss a new theoretical basis for perturbation methods. In developing this new theoretical basis, we define the ideal measures of data utility and disclosure risk. Maximum data utility is achieved when the statistical characteristics of the perturbed data are the same as that of the original data. Disclosure risk is minimized if providing users with microdata access does not result in any additional information. We show that when the perturbed values of the confidential variables are generated as independent realizations from the distribution of the confidential variables conditioned on the non-confidential variables, they satisfy the data utility and disclosure risk requirements. We also discuss the relationship between the theoretical basis and some commonly used methods for generating perturbed values of confidential numerical variables.  相似文献   
50.
遗传算法在入侵检测中的应用   总被引:4,自引:0,他引:4  
介绍了基于模型推理和基于模型两种入侵检测系统,提出了一种新的基于智能体技术的入侵检测系统体系结构,解决了传统集中式入侵检测系统的弊病,将任务处理和数据分布到网络各个结点上,充分利用网络资源协同完成入侵检测任务;介绍了遗传算法在该系统中的应用,因系统安全的先验知识体现在对原始数据中有价值特征属性变量集的选择上,故利用遗传算法对特征属性变量子集的选择进行优化,找到相对最优的由特征向量表示的特征属性变量集,以降低入侵检测系统的负荷。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号