全文获取类型
收费全文 | 264篇 |
免费 | 14篇 |
专业分类
管理学 | 55篇 |
民族学 | 9篇 |
人口学 | 14篇 |
理论方法论 | 29篇 |
综合类 | 6篇 |
社会学 | 95篇 |
统计学 | 70篇 |
出版年
2023年 | 5篇 |
2022年 | 5篇 |
2021年 | 7篇 |
2020年 | 12篇 |
2019年 | 22篇 |
2018年 | 23篇 |
2017年 | 24篇 |
2016年 | 17篇 |
2015年 | 10篇 |
2014年 | 14篇 |
2013年 | 43篇 |
2012年 | 13篇 |
2011年 | 16篇 |
2010年 | 5篇 |
2009年 | 8篇 |
2008年 | 3篇 |
2007年 | 9篇 |
2006年 | 5篇 |
2005年 | 4篇 |
2004年 | 3篇 |
2003年 | 2篇 |
2002年 | 2篇 |
2001年 | 4篇 |
2000年 | 1篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1993年 | 3篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1983年 | 3篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1979年 | 2篇 |
1978年 | 1篇 |
排序方式: 共有278条查询结果,搜索用时 31 毫秒
41.
42.
In this paper, the loading analysis of an automated double-loop interbay material handling system (AMHS) in a wafer fabrication was analysed, considering the effects of the vehicle numbers in the inner and outer loops. Discrete-event simulation models were developed in e-M Plant to study this AMHS system with a zone control scheme to avoid any vehicle collision. The layout of an interbay system is a combination configuration in which the hallway contains double loops and the vehicles have double capacity. The combination of the shortest distance with nearest vehicle (SD–NV) and the first-encounter-first-served (FEFS) dispatching rule was used in this study. The maximum loading of this interbay system can be determined by the simulation approach. We also found that the number of vehicles in the inner and outer loops can significantly affect the interbay performance. Furthermore, the optimum combination of the vehicle numbers in the inner and outer loops can be obtained by response surface methodology. 相似文献
43.
Using qualitative interview data gathered from 28 Hmong adolescents, we examined the meaning ascribed to language and style and how language and style behaviors are used to distinguish identity. We found that the participants used language and style to define their own ethnic group membership and cultural identities. Moreover they inferred meaning from these identity behaviors to discern which peer groups are desirable (those who wear American style clothing and are bilingual) and which are of low social status (“fobby” style clothing and monolingual). The cultural identity symbols used by participants reveal heterogeneity among Hmong adolescent peer groups and evolving definitions of what it means to be Hmong in America. 相似文献
44.
Nam-Ky Nguyen 《Australian & New Zealand Journal of Statistics》2001,43(3):367-374
Most experimental material in agriculture and industry is heterogeneous in nature and therefore its statistical analysis benefits from blocking. Many experiments are restricted in time or space, and again blocking is useful. This paper adopts the idea of orthogonal blocking of Box & Hunter (1957) and applies it to optimal blocking designs. This approach is then compared with the determinant-based approach described in the literature for constructing block designs. 相似文献
45.
In terms of the risk of making a Type I error in evaluating a null hypothesis of equality, requiring two independent confirmatory trials with two‐sided p‐values less than 0.05 is equivalent to requiring one confirmatory trial with two‐sided p‐value less than 0.001 25. Furthermore, the use of a single confirmatory trial is gaining acceptability, with discussion in both ICH E9 and a CPMP Points to Consider document. Given the growing acceptance of this approach, this note provides a formula for the sample size savings that are obtained with the single clinical trial approach depending on the levels of Type I and Type II errors chosen. For two replicate trials each powered at 90%, which corresponds to a single larger trial powered at 81%, an approximate 19% reduction in total sample size is achieved with the single trial approach. Alternatively, a single trial with the same sample size as the total sample size from two smaller trials will have much greater power. For example, in the case where two trials are each powered at 90% for two‐sided α=0.05 yielding an overall power of 81%, a single trial using two‐sided α=0.001 25 would have 91% power. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献
46.
Yilin Shen Thang N. Dinh My T. Thai Hien T. Nguyen 《Journal of Combinatorial Optimization》2014,28(1):186-217
As an imperative channel for fast information propagation, online social networks (OSNs) also have their defects. One of them is the information leakage, i.e., information could be spread via OSNs to the users whom we are not willing to share with. Thus the problem of constructing a circle of trust to share information with as many friends as possible without further spreading it to unwanted targets has become a challenging research topic but still remained open. Our work is the first attempt to study the Maximum Circle of Trust problem seeking to share the information with the maximum expected number of poster’s friends such that the information spread to the unwanted targets is brought to its knees. First, we consider a special and more practical case with the two-hop information propagation and a single unwanted target. In this case, we show that this problem is NP-hard, which denies the existence of an exact polynomial-time algorithm. We thus propose a Fully Polynomial-Time Approximation Scheme (FPTAS), which can not only adjust any allowable performance error bound but also run in polynomial time with both the input size and allowed error. FPTAS is the best approximation solution one can ever wish for an NP-hard problem. We next consider the number of unwanted targets is bounded and prove that there does not exist an FPTAS in this case. Instead, we design a Polynomial-Time Approximation Scheme (PTAS) in which the allowable error can also be controlled. When the number of unwanted targets are not bounded, we provide a randomized algorithm, along with the analytical theoretical bound and inapproximaibility result. Finally, we consider a general case with many hops information propagation and further show its #P-hardness and propose an effective Iterative Circle of Trust Detection (ICTD) algorithm based on a novel greedy function. An extensive experiment on various real-world OSNs has validated the effectiveness of our proposed approximation and ICTD algorithms. Such an extensive experiment also highlights several important observations on information leakage which help to sharpen the security of OSNs in the future. 相似文献
47.
Muhammad Aslam Ching-Ho Yen Chia-Hao Chang Chi-Hyuck Jun Munir Ahmad Mujahid Rasool 《统计学通讯:理论与方法》2013,42(20):3633-3647
In this article, a variable two-stage acceptance sampling plan is developed when the quality characteristic is evaluated through a process loss function. The plan parameters of the proposed plan are determined by using the two-point approach and tabulated according to various quality levels. Two cases are discussed when the process mean lies at the target value and when it does not, respectively. Extensive tables are provided for both cases and the results are explained with examples. The advantage of the proposed plan is compared with the existing variable single acceptance sampling plan using the process loss function. 相似文献
48.
Minh Ngoc Tran 《统计学通讯:模拟与计算》2013,42(8):1610-1624
We consider the problem of choosing the ridge parameter. Two penalized maximum likelihood (PML) criteria based on a distribution-free and a data-dependent penalty function are proposed. These PML criteria can be considered as “continuous” versions of AIC. A systematic simulation is conducted to compare the suggested criteria to several existing methods. The simulation results strongly support the use of our method. The method is also applied to two real data sets. 相似文献
49.
While Markov chain Monte Carlo (MCMC) methods are frequently used for difficult calculations in a wide range of scientific disciplines, they suffer from a serious limitation: their samples are not independent and identically distributed. Consequently, estimates of expectations are biased if the initial value of the chain is not drawn from the target distribution. Regenerative simulation provides an elegant solution to this problem. In this article, we propose a simple regenerative MCMC algorithm to generate variates for any distribution. 相似文献
50.
We investigate the asymptotic behaviour of the recursive Nadaraya–Watson estimator for the estimation of the regression function in a semiparametric regression model. On the one hand, we make use of the recursive version of the sliced inverse regression method for the estimation of the unknown parameter of the model. On the other hand, we implement a recursive Nadaraya–Watson procedure for the estimation of the regression function which takes into account the previous estimation of the parameter of the semiparametric regression model. We establish the almost sure convergence as well as the asymptotic normality for our Nadaraya–Watson estimate. We also illustrate our semiparametric estimation procedure on simulated data. 相似文献