首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   264篇
  免费   14篇
管理学   55篇
民族学   9篇
人口学   14篇
理论方法论   29篇
综合类   6篇
社会学   95篇
统计学   70篇
  2023年   5篇
  2022年   5篇
  2021年   7篇
  2020年   12篇
  2019年   22篇
  2018年   23篇
  2017年   24篇
  2016年   17篇
  2015年   10篇
  2014年   14篇
  2013年   43篇
  2012年   13篇
  2011年   16篇
  2010年   5篇
  2009年   8篇
  2008年   3篇
  2007年   9篇
  2006年   5篇
  2005年   4篇
  2004年   3篇
  2003年   2篇
  2002年   2篇
  2001年   4篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1997年   2篇
  1996年   2篇
  1993年   3篇
  1990年   1篇
  1989年   1篇
  1983年   3篇
  1982年   2篇
  1981年   1篇
  1979年   2篇
  1978年   1篇
排序方式: 共有278条查询结果,搜索用时 31 毫秒
41.
42.
In this paper, the loading analysis of an automated double-loop interbay material handling system (AMHS) in a wafer fabrication was analysed, considering the effects of the vehicle numbers in the inner and outer loops. Discrete-event simulation models were developed in e-M Plant to study this AMHS system with a zone control scheme to avoid any vehicle collision. The layout of an interbay system is a combination configuration in which the hallway contains double loops and the vehicles have double capacity. The combination of the shortest distance with nearest vehicle (SD–NV) and the first-encounter-first-served (FEFS) dispatching rule was used in this study. The maximum loading of this interbay system can be determined by the simulation approach. We also found that the number of vehicles in the inner and outer loops can significantly affect the interbay performance. Furthermore, the optimum combination of the vehicle numbers in the inner and outer loops can be obtained by response surface methodology.  相似文献   
43.
Using qualitative interview data gathered from 28 Hmong adolescents, we examined the meaning ascribed to language and style and how language and style behaviors are used to distinguish identity. We found that the participants used language and style to define their own ethnic group membership and cultural identities. Moreover they inferred meaning from these identity behaviors to discern which peer groups are desirable (those who wear American style clothing and are bilingual) and which are of low social status (“fobby” style clothing and monolingual). The cultural identity symbols used by participants reveal heterogeneity among Hmong adolescent peer groups and evolving definitions of what it means to be Hmong in America.  相似文献   
44.
Most experimental material in agriculture and industry is heterogeneous in nature and therefore its statistical analysis benefits from blocking. Many experiments are restricted in time or space, and again blocking is useful. This paper adopts the idea of orthogonal blocking of Box & Hunter (1957) and applies it to optimal blocking designs. This approach is then compared with the determinant-based approach described in the literature for constructing block designs.  相似文献   
45.
In terms of the risk of making a Type I error in evaluating a null hypothesis of equality, requiring two independent confirmatory trials with two‐sided p‐values less than 0.05 is equivalent to requiring one confirmatory trial with two‐sided p‐value less than 0.001 25. Furthermore, the use of a single confirmatory trial is gaining acceptability, with discussion in both ICH E9 and a CPMP Points to Consider document. Given the growing acceptance of this approach, this note provides a formula for the sample size savings that are obtained with the single clinical trial approach depending on the levels of Type I and Type II errors chosen. For two replicate trials each powered at 90%, which corresponds to a single larger trial powered at 81%, an approximate 19% reduction in total sample size is achieved with the single trial approach. Alternatively, a single trial with the same sample size as the total sample size from two smaller trials will have much greater power. For example, in the case where two trials are each powered at 90% for two‐sided α=0.05 yielding an overall power of 81%, a single trial using two‐sided α=0.001 25 would have 91% power. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
46.
As an imperative channel for fast information propagation, online social networks (OSNs) also have their defects. One of them is the information leakage, i.e., information could be spread via OSNs to the users whom we are not willing to share with. Thus the problem of constructing a circle of trust to share information with as many friends as possible without further spreading it to unwanted targets has become a challenging research topic but still remained open. Our work is the first attempt to study the Maximum Circle of Trust problem seeking to share the information with the maximum expected number of poster’s friends such that the information spread to the unwanted targets is brought to its knees. First, we consider a special and more practical case with the two-hop information propagation and a single unwanted target. In this case, we show that this problem is NP-hard, which denies the existence of an exact polynomial-time algorithm. We thus propose a Fully Polynomial-Time Approximation Scheme (FPTAS), which can not only adjust any allowable performance error bound but also run in polynomial time with both the input size and allowed error. FPTAS is the best approximation solution one can ever wish for an NP-hard problem. We next consider the number of unwanted targets is bounded and prove that there does not exist an FPTAS in this case. Instead, we design a Polynomial-Time Approximation Scheme (PTAS) in which the allowable error can also be controlled. When the number of unwanted targets are not bounded, we provide a randomized algorithm, along with the analytical theoretical bound and inapproximaibility result. Finally, we consider a general case with many hops information propagation and further show its #P-hardness and propose an effective Iterative Circle of Trust Detection (ICTD) algorithm based on a novel greedy function. An extensive experiment on various real-world OSNs has validated the effectiveness of our proposed approximation and ICTD algorithms. Such an extensive experiment also highlights several important observations on information leakage which help to sharpen the security of OSNs in the future.  相似文献   
47.
In this article, a variable two-stage acceptance sampling plan is developed when the quality characteristic is evaluated through a process loss function. The plan parameters of the proposed plan are determined by using the two-point approach and tabulated according to various quality levels. Two cases are discussed when the process mean lies at the target value and when it does not, respectively. Extensive tables are provided for both cases and the results are explained with examples. The advantage of the proposed plan is compared with the existing variable single acceptance sampling plan using the process loss function.  相似文献   
48.
We consider the problem of choosing the ridge parameter. Two penalized maximum likelihood (PML) criteria based on a distribution-free and a data-dependent penalty function are proposed. These PML criteria can be considered as “continuous” versions of AIC. A systematic simulation is conducted to compare the suggested criteria to several existing methods. The simulation results strongly support the use of our method. The method is also applied to two real data sets.  相似文献   
49.
While Markov chain Monte Carlo (MCMC) methods are frequently used for difficult calculations in a wide range of scientific disciplines, they suffer from a serious limitation: their samples are not independent and identically distributed. Consequently, estimates of expectations are biased if the initial value of the chain is not drawn from the target distribution. Regenerative simulation provides an elegant solution to this problem. In this article, we propose a simple regenerative MCMC algorithm to generate variates for any distribution.  相似文献   
50.
We investigate the asymptotic behaviour of the recursive Nadaraya–Watson estimator for the estimation of the regression function in a semiparametric regression model. On the one hand, we make use of the recursive version of the sliced inverse regression method for the estimation of the unknown parameter of the model. On the other hand, we implement a recursive Nadaraya–Watson procedure for the estimation of the regression function which takes into account the previous estimation of the parameter of the semiparametric regression model. We establish the almost sure convergence as well as the asymptotic normality for our Nadaraya–Watson estimate. We also illustrate our semiparametric estimation procedure on simulated data.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号