首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   861篇
  免费   26篇
  国内免费   5篇
管理学   48篇
民族学   1篇
人口学   2篇
丛书文集   36篇
理论方法论   14篇
综合类   576篇
社会学   34篇
统计学   181篇
  2023年   4篇
  2021年   7篇
  2020年   15篇
  2019年   12篇
  2018年   26篇
  2017年   35篇
  2016年   28篇
  2015年   33篇
  2014年   34篇
  2013年   98篇
  2012年   36篇
  2011年   53篇
  2010年   53篇
  2009年   46篇
  2008年   44篇
  2007年   52篇
  2006年   54篇
  2005年   50篇
  2004年   37篇
  2003年   25篇
  2002年   25篇
  2001年   22篇
  2000年   23篇
  1999年   13篇
  1998年   9篇
  1997年   8篇
  1996年   13篇
  1995年   13篇
  1994年   5篇
  1993年   4篇
  1992年   4篇
  1991年   2篇
  1990年   1篇
  1989年   2篇
  1987年   2篇
  1986年   2篇
  1984年   1篇
  1978年   1篇
排序方式: 共有892条查询结果,搜索用时 250 毫秒
41.
This paper considers five test statistics for comparing the recovery of a rapid growth‐based enumeration test with respect to the compendial microbiological method using a specific nonserial dilution experiment. The finite sample distributions of these test statistics are unknown, because they are functions of correlated count data. A simulation study is conducted to investigate the type I and type II error rates. For a balanced experimental design, the likelihood ratio test and the main effects analysis of variance (ANOVA) test for microbiological methods demonstrated nominal values for the type I error rate and provided the highest power compared with a test on weighted averages and two other ANOVA tests. The likelihood ratio test is preferred because it can also be used for unbalanced designs. It is demonstrated that an increase in power can only be achieved by an increase in the spiked number of organisms used in the experiment. The power is surprisingly not affected by the number of dilutions or the number of test samples. A real case study is provided to illustrate the theory. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
42.
The gist of the quickest change-point detection problem is to detect the presence of a change in the statistical behavior of a series of sequentially made observations, and do so in an optimal detection-speed-versus-“false-positive”-risk manner. When optimality is understood either in the generalized Bayesian sense or as defined in Shiryaev's multi-cyclic setup, the so-called Shiryaev–Roberts (SR) detection procedure is known to be the “best one can do”, provided, however, that the observations’ pre- and post-change distributions are both fully specified. We consider a more realistic setup, viz. one where the post-change distribution is assumed known only up to a parameter, so that the latter may be misspecified. The question of interest is the sensitivity (or robustness) of the otherwise “best” SR procedure with respect to a possible misspecification of the post-change distribution parameter. To answer this question, we provide a case study where, in a specific Gaussian scenario, we allow the SR procedure to be “out of tune” in the way of the post-change distribution parameter, and numerically assess the effect of the “mistuning” on Shiryaev's (multi-cyclic) Stationary Average Detection Delay delivered by the SR procedure. The comprehensive quantitative robustness characterization of the SR procedure obtained in the study can be used to develop the respective theory as well as to provide a rational for practical design of the SR procedure. The overall qualitative conclusion of the study is an expected one: the SR procedure is less (more) robust for less (more) contrast changes and for lower (higher) levels of the false alarm risk.  相似文献   
43.
DNS服务器所面临的威胁集中表现出了互连网的脆弱性,针对DNS服务器的拒绝服务攻击是DNS服务器面临的最大威胁.提出了一种针对查询攻击进行侦测和阻止的思路,并且在solaris的平台上用perl语言来实现,能够保证DNS服务器有效地抵御常规攻击,为正常用户提供及时的服务.同时,本文也对伪造源IP的分布式拒绝服务攻击提出了一种解决方案.  相似文献   
44.
This article examines the representations of men and masculinities in contemporary crime narratives featuring a female protagonist. These “chick dick” stories (which adapt elements from the hardboiled detective novel, film noir, chick lit, and chick flicks) repeatedly engage with the gendered power dynamics made visible and problematic through the intersection of “chick” and crime genres, most particularly the sexualization of violence. In these narratives, popular masculinities operate as deployable concepts to dramatize contemporary gender relations. By tapping into the popular sentiment of a “crisis in masculinity,” chick dick texts also mobilize a rhetoric of unrepresentable male victimization and individual male pathologies. This strategy highlights the spaces and places in which masculinities are made vulnerable at the same time as it offers simplistic and individualized explanations for the systemic sexualized violence that dominate these narratives.  相似文献   
45.
The paper gives an asymptotic distribution of a test statistic for detecting a change in a mean of random vectors with dependent components. The studied test statistic has a form of a maximum of a square Euclidean norms of vectors with components being standardized partial cumulative sums of deviations from means. The limit distribution was obtained using a result of Piterbarg [1994. High deviations for multidimensional stationary Gaussian processes with independent components. In: Zolotarev, V.M. (Ed.), Stability Problems for Stochastic Models, pp. 197–210].  相似文献   
46.
The combined EWMA-X chart is a commonly used tool for monitoring both large and small process shifts. However, this chart requires calculating and monitoring two statistics along with two sets of control limits. Thus, this study develops a single-featured EWMA-X (called SFEWMA-X) control chart which has the ability to simultaneously monitor both large and small process shifts using only one set of statistic and control limits. The proposed SFEWMA-X chart is further extended to monitoring the shifts in process standard deviation. A set of simulated data are used to demonstrate the proposed chart's superior performance in terms of average run length compared with that of the traditional charts. The experimental examples also show that the SFEWMA-X chart is neater and easier to visually interpret than the original EWMA-X chart.  相似文献   
47.
We describe a method of computing the cumulative distribution function of the maximum and minimum cell frequencies in sampling distributions commonly encountered in the analysis of categorical data.The procedure is efficient for exact or approximate calculation in both homogeneous and non-homogeneous cases, is non-recursive, and does not require Dirichlet integrals.Some related statistical problems are also discussed.  相似文献   
48.
本文通过分析BP神经网络用于模拟电路故障诊断时的缺点,提出了一种新的神经网络.称为“透明”神经网络(TANN).然后将TANN用于模拟电路子网络级故障诊断.并通过实例验证了该诊断方法的有效性.  相似文献   
49.
Computer simulation is an effective tool for assessing mitigation strategies, with recent trends concentrating on agent-based techniques. These methods require high computational efforts in order to simulate enough scenarios for statistical significance. The population individuals and their contacts determined by agent-based simulations form a social network. For some network structures it is possible to gain high accuracy estimates of contagion spread based on the connection structure of the network, an idea that is utilized in this work. A representative social network constructed from the 2006 census of the Greater Toronto Area (Ontario, Canada) of 5 million individuals in 1.8 million households is used to demonstrate the efficacy of our approach. We examine the effects of six mitigation strategies with respect to their ability to contain disease spread as indicated by pre- and post-vaccination reproduction numbers, mean local clustering coefficients and degree distributions. One outcome of the analysis provides evidence supporting the design of mitigation strategies that aim to fragment the population into similarly sized components. While our analysis is framed in the context of pandemic disease spread, the approach is applicable to any contagion such as computer viruses, rumours, social trends, and so on.  相似文献   
50.
根据当前网络信息传播的混乱情况,在某种场合进行网络信息监控很有必要.该文提出了网络信息监控的几种实现方法和标准的信息监控流程,讨论设计网络信息监控系统的系统架构方法以及信息监控中应根据实际采用各种不同的技术组合,以达到全方位对网络信息进行监控.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号