全文获取类型
收费全文 | 660篇 |
免费 | 20篇 |
国内免费 | 4篇 |
专业分类
管理学 | 28篇 |
民族学 | 2篇 |
人口学 | 2篇 |
丛书文集 | 14篇 |
理论方法论 | 5篇 |
综合类 | 422篇 |
社会学 | 32篇 |
统计学 | 179篇 |
出版年
2023年 | 3篇 |
2021年 | 4篇 |
2020年 | 14篇 |
2019年 | 11篇 |
2018年 | 19篇 |
2017年 | 31篇 |
2016年 | 29篇 |
2015年 | 29篇 |
2014年 | 27篇 |
2013年 | 79篇 |
2012年 | 26篇 |
2011年 | 32篇 |
2010年 | 40篇 |
2009年 | 28篇 |
2008年 | 30篇 |
2007年 | 43篇 |
2006年 | 46篇 |
2005年 | 33篇 |
2004年 | 20篇 |
2003年 | 15篇 |
2002年 | 8篇 |
2001年 | 17篇 |
2000年 | 13篇 |
1999年 | 12篇 |
1998年 | 10篇 |
1997年 | 7篇 |
1996年 | 13篇 |
1995年 | 14篇 |
1994年 | 7篇 |
1993年 | 2篇 |
1992年 | 7篇 |
1990年 | 5篇 |
1989年 | 4篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 2篇 |
1978年 | 1篇 |
排序方式: 共有684条查询结果,搜索用时 218 毫秒
41.
Andrea Braithwaite 《Feminist Media Studies》2013,13(4):417-432
This article examines the representations of men and masculinities in contemporary crime narratives featuring a female protagonist. These “chick dick” stories (which adapt elements from the hardboiled detective novel, film noir, chick lit, and chick flicks) repeatedly engage with the gendered power dynamics made visible and problematic through the intersection of “chick” and crime genres, most particularly the sexualization of violence. In these narratives, popular masculinities operate as deployable concepts to dramatize contemporary gender relations. By tapping into the popular sentiment of a “crisis in masculinity,” chick dick texts also mobilize a rhetoric of unrepresentable male victimization and individual male pathologies. This strategy highlights the spaces and places in which masculinities are made vulnerable at the same time as it offers simplistic and individualized explanations for the systemic sexualized violence that dominate these narratives. 相似文献
42.
The paper gives an asymptotic distribution of a test statistic for detecting a change in a mean of random vectors with dependent components. The studied test statistic has a form of a maximum of a square Euclidean norms of vectors with components being standardized partial cumulative sums of deviations from means. The limit distribution was obtained using a result of Piterbarg [1994. High deviations for multidimensional stationary Gaussian processes with independent components. In: Zolotarev, V.M. (Ed.), Stability Problems for Stochastic Models, pp. 197–210]. 相似文献
43.
Chi-Shuan Liu 《Journal of applied statistics》2011,38(11):2575-2596
The combined EWMA-X chart is a commonly used tool for monitoring both large and small process shifts. However, this chart requires calculating and monitoring two statistics along with two sets of control limits. Thus, this study develops a single-featured EWMA-X (called SFEWMA-X) control chart which has the ability to simultaneously monitor both large and small process shifts using only one set of statistic and control limits. The proposed SFEWMA-X chart is further extended to monitoring the shifts in process standard deviation. A set of simulated data are used to demonstrate the proposed chart's superior performance in terms of average run length compared with that of the traditional charts. The experimental examples also show that the SFEWMA-X chart is neater and easier to visually interpret than the original EWMA-X chart. 相似文献
44.
《The Senses and Society》2013,8(1):72-86
ABSTRACTSound studies and Deaf studies may seem at first impression to operate in worlds apart. We argue in this article, however, that similar renderings of hearing, deafness, and seeing as ideal types—and as often essentialized sensory modes—make it possible to read differences between Sound studies and Deaf studies as sites of possible articulation. We direct attention to four zones of productive overlap, attending to how sound is inferred in deaf and Deaf practice, how reimagining sound in the register of low-frequency vibration can upend deafhearing dichotomies, how “deaf futurists” champion cyborg sound, and how signing and other non-spoken communicative practices might undo phonocentric models of speech. Sound studies and Deaf studies emerge as fields with much to offer one another epistemologically, theoretically, and practically. 相似文献
45.
Bruce Levin 《统计学通讯:理论与方法》2013,42(11):1299-1327
We describe a method of computing the cumulative distribution function of the maximum and minimum cell frequencies in sampling distributions commonly encountered in the analysis of categorical data.The procedure is efficient for exact or approximate calculation in both homogeneous and non-homogeneous cases, is non-recursive, and does not require Dirichlet integrals.Some related statistical problems are also discussed. 相似文献
46.
张玉红 《佛山科学技术学院学报(社会科学版)》1995,(4)
分析了解析方法和数值方法在加筋壳体振动特性分析中的应用及两种基本方法的利弊,提出一种改进的分析方法──半解析数值法. 相似文献
47.
Computer simulation is an effective tool for assessing mitigation strategies, with recent trends concentrating on agent-based techniques. These methods require high computational efforts in order to simulate enough scenarios for statistical significance. The population individuals and their contacts determined by agent-based simulations form a social network. For some network structures it is possible to gain high accuracy estimates of contagion spread based on the connection structure of the network, an idea that is utilized in this work. A representative social network constructed from the 2006 census of the Greater Toronto Area (Ontario, Canada) of 5 million individuals in 1.8 million households is used to demonstrate the efficacy of our approach. We examine the effects of six mitigation strategies with respect to their ability to contain disease spread as indicated by pre- and post-vaccination reproduction numbers, mean local clustering coefficients and degree distributions. One outcome of the analysis provides evidence supporting the design of mitigation strategies that aim to fragment the population into similarly sized components. While our analysis is framed in the context of pandemic disease spread, the approach is applicable to any contagion such as computer viruses, rumours, social trends, and so on. 相似文献
48.
洪伟铭 《湛江师范学院学报》2007,28(3):112-115
根据当前网络信息传播的混乱情况,在某种场合进行网络信息监控很有必要.该文提出了网络信息监控的几种实现方法和标准的信息监控流程,讨论设计网络信息监控系统的系统架构方法以及信息监控中应根据实际采用各种不同的技术组合,以达到全方位对网络信息进行监控. 相似文献
49.
针对光学联合探测子系统探测概率的不同特点,提出一种新的系统工作模式,使系统的最终探测概率有较大提高。当子系统的探测概率均比较低时,直接对子系统的探测数据进行融合,可以获得较高探测概率;当各子系统探测概率相差较大时,可先对探测数据进行选择,然后再进行数据融合,这样可以在总探测概率减小不大的情况下,使虚警概率明显降低。 相似文献
50.
为了提高分类器的正确率和减少训练时间,将特征提取技术与分类算法结合,提出了一种基于核Fisher鉴别分析和最小极大概率机算法的入侵检测算法。利用核Fisher鉴别分析技术提取关键特征,运用最小极大概率机对提取特征后的数据进行分类,采用离线数据集KDDCUP99进行实验。实验结果表明,该算法是可行和有效的,使分类性能和训练时间都得到了提高。 相似文献