全文获取类型
收费全文 | 521篇 |
免费 | 17篇 |
国内免费 | 3篇 |
专业分类
管理学 | 28篇 |
民族学 | 1篇 |
人口学 | 2篇 |
丛书文集 | 11篇 |
理论方法论 | 3篇 |
综合类 | 285篇 |
社会学 | 32篇 |
统计学 | 179篇 |
出版年
2023年 | 3篇 |
2021年 | 4篇 |
2020年 | 13篇 |
2019年 | 11篇 |
2018年 | 19篇 |
2017年 | 28篇 |
2016年 | 18篇 |
2015年 | 23篇 |
2014年 | 22篇 |
2013年 | 73篇 |
2012年 | 23篇 |
2011年 | 26篇 |
2010年 | 34篇 |
2009年 | 22篇 |
2008年 | 28篇 |
2007年 | 33篇 |
2006年 | 35篇 |
2005年 | 31篇 |
2004年 | 16篇 |
2003年 | 10篇 |
2002年 | 6篇 |
2001年 | 11篇 |
2000年 | 8篇 |
1999年 | 6篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1996年 | 11篇 |
1995年 | 5篇 |
1994年 | 3篇 |
1992年 | 4篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1978年 | 1篇 |
排序方式: 共有541条查询结果,搜索用时 265 毫秒
21.
This paper considers five test statistics for comparing the recovery of a rapid growth‐based enumeration test with respect to the compendial microbiological method using a specific nonserial dilution experiment. The finite sample distributions of these test statistics are unknown, because they are functions of correlated count data. A simulation study is conducted to investigate the type I and type II error rates. For a balanced experimental design, the likelihood ratio test and the main effects analysis of variance (ANOVA) test for microbiological methods demonstrated nominal values for the type I error rate and provided the highest power compared with a test on weighted averages and two other ANOVA tests. The likelihood ratio test is preferred because it can also be used for unbalanced designs. It is demonstrated that an increase in power can only be achieved by an increase in the spiked number of organisms used in the experiment. The power is surprisingly not affected by the number of dilutions or the number of test samples. A real case study is provided to illustrate the theory. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
22.
金伟明 《绍兴文理学院学报》2010,(1)
DNS服务器所面临的威胁集中表现出了互连网的脆弱性,针对DNS服务器的拒绝服务攻击是DNS服务器面临的最大威胁.提出了一种针对查询攻击进行侦测和阻止的思路,并且在solaris的平台上用perl语言来实现,能够保证DNS服务器有效地抵御常规攻击,为正常用户提供及时的服务.同时,本文也对伪造源IP的分布式拒绝服务攻击提出了一种解决方案. 相似文献
23.
Andrea Braithwaite 《Feminist Media Studies》2013,13(4):417-432
This article examines the representations of men and masculinities in contemporary crime narratives featuring a female protagonist. These “chick dick” stories (which adapt elements from the hardboiled detective novel, film noir, chick lit, and chick flicks) repeatedly engage with the gendered power dynamics made visible and problematic through the intersection of “chick” and crime genres, most particularly the sexualization of violence. In these narratives, popular masculinities operate as deployable concepts to dramatize contemporary gender relations. By tapping into the popular sentiment of a “crisis in masculinity,” chick dick texts also mobilize a rhetoric of unrepresentable male victimization and individual male pathologies. This strategy highlights the spaces and places in which masculinities are made vulnerable at the same time as it offers simplistic and individualized explanations for the systemic sexualized violence that dominate these narratives. 相似文献
24.
The paper gives an asymptotic distribution of a test statistic for detecting a change in a mean of random vectors with dependent components. The studied test statistic has a form of a maximum of a square Euclidean norms of vectors with components being standardized partial cumulative sums of deviations from means. The limit distribution was obtained using a result of Piterbarg [1994. High deviations for multidimensional stationary Gaussian processes with independent components. In: Zolotarev, V.M. (Ed.), Stability Problems for Stochastic Models, pp. 197–210]. 相似文献
25.
Chi-Shuan Liu 《Journal of applied statistics》2011,38(11):2575-2596
The combined EWMA-X chart is a commonly used tool for monitoring both large and small process shifts. However, this chart requires calculating and monitoring two statistics along with two sets of control limits. Thus, this study develops a single-featured EWMA-X (called SFEWMA-X) control chart which has the ability to simultaneously monitor both large and small process shifts using only one set of statistic and control limits. The proposed SFEWMA-X chart is further extended to monitoring the shifts in process standard deviation. A set of simulated data are used to demonstrate the proposed chart's superior performance in terms of average run length compared with that of the traditional charts. The experimental examples also show that the SFEWMA-X chart is neater and easier to visually interpret than the original EWMA-X chart. 相似文献
26.
Bruce Levin 《统计学通讯:理论与方法》2013,42(11):1299-1327
We describe a method of computing the cumulative distribution function of the maximum and minimum cell frequencies in sampling distributions commonly encountered in the analysis of categorical data.The procedure is efficient for exact or approximate calculation in both homogeneous and non-homogeneous cases, is non-recursive, and does not require Dirichlet integrals.Some related statistical problems are also discussed. 相似文献
27.
Computer simulation is an effective tool for assessing mitigation strategies, with recent trends concentrating on agent-based techniques. These methods require high computational efforts in order to simulate enough scenarios for statistical significance. The population individuals and their contacts determined by agent-based simulations form a social network. For some network structures it is possible to gain high accuracy estimates of contagion spread based on the connection structure of the network, an idea that is utilized in this work. A representative social network constructed from the 2006 census of the Greater Toronto Area (Ontario, Canada) of 5 million individuals in 1.8 million households is used to demonstrate the efficacy of our approach. We examine the effects of six mitigation strategies with respect to their ability to contain disease spread as indicated by pre- and post-vaccination reproduction numbers, mean local clustering coefficients and degree distributions. One outcome of the analysis provides evidence supporting the design of mitigation strategies that aim to fragment the population into similarly sized components. While our analysis is framed in the context of pandemic disease spread, the approach is applicable to any contagion such as computer viruses, rumours, social trends, and so on. 相似文献
28.
洪伟铭 《湛江师范学院学报》2007,28(3):112-115
根据当前网络信息传播的混乱情况,在某种场合进行网络信息监控很有必要.该文提出了网络信息监控的几种实现方法和标准的信息监控流程,讨论设计网络信息监控系统的系统架构方法以及信息监控中应根据实际采用各种不同的技术组合,以达到全方位对网络信息进行监控. 相似文献
29.
针对光学联合探测子系统探测概率的不同特点,提出一种新的系统工作模式,使系统的最终探测概率有较大提高。当子系统的探测概率均比较低时,直接对子系统的探测数据进行融合,可以获得较高探测概率;当各子系统探测概率相差较大时,可先对探测数据进行选择,然后再进行数据融合,这样可以在总探测概率减小不大的情况下,使虚警概率明显降低。 相似文献
30.
为了提高分类器的正确率和减少训练时间,将特征提取技术与分类算法结合,提出了一种基于核Fisher鉴别分析和最小极大概率机算法的入侵检测算法。利用核Fisher鉴别分析技术提取关键特征,运用最小极大概率机对提取特征后的数据进行分类,采用离线数据集KDDCUP99进行实验。实验结果表明,该算法是可行和有效的,使分类性能和训练时间都得到了提高。 相似文献