首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   66篇
  免费   3篇
管理学   6篇
民族学   1篇
丛书文集   7篇
理论方法论   1篇
综合类   27篇
社会学   2篇
统计学   25篇
  2022年   1篇
  2017年   1篇
  2016年   1篇
  2015年   1篇
  2014年   1篇
  2013年   9篇
  2012年   4篇
  2011年   3篇
  2010年   5篇
  2009年   2篇
  2008年   1篇
  2007年   2篇
  2006年   3篇
  2005年   4篇
  2004年   4篇
  2003年   5篇
  2002年   6篇
  2001年   2篇
  2000年   3篇
  1999年   2篇
  1998年   4篇
  1997年   1篇
  1996年   1篇
  1994年   1篇
  1993年   1篇
  1990年   1篇
排序方式: 共有69条查询结果,搜索用时 15 毫秒
21.
22.
讨论了数字系统的故障分析的内涵,阐述了故障的可测性定理,并以组合逻辑电路为例,介绍如何利用布尔差分法求解其全部测试码,给出了多重故障测试码的公式,说明了布尔差分法数字系统故障诊断的局限性。  相似文献   
23.
在通过对任一正整数提出另外一种唯一分解式的基础上,利用初等方法得到了关于立方补数的几个有趣的渐近公式。  相似文献   
24.
A non‐parametric kernel estimator of the spectral density of stationary random closed sets is studied. Conditions are derived under which this estimator is asymptotically unbiased and mean‐square consistent. For the planar Boolean model with isotropic compact and convex grains, an averaged version of the kernel estimator is compared with the theoretical spectral density.  相似文献   
25.
本文通过对中美文化中一些日常礼貌用语差异的现象分析,阐述了中美文化交际中礼貌用语的价 值观取向,在此基础上论述了价值观取向决定不同文化中礼貌用语的差异。  相似文献   
26.
本文在[1][2]的基础上,首先讨论四元数体上的Hermite矩阵的行列式的性质。然后讨论重行列式的性质,对于重行列式,完整地给出了相应于域上行列式的基本性质。最后可把复数域上著名的Schur公式推广到四元数体上。  相似文献   
27.
Renyi (Bull. Amer. Math. Soc. 71 (6) (1965) 809) suggested a combinatorial group testing model, in which the size of a testing group was restricted. In this model, Renyi considered the search of one defective element (significant factor) from the finite set of elements (factors). The corresponding optimal search designs were obtained by Katona (J. Combin. Theory 1 (2) (1966) 174). In the present work, we study Renyi's search model of several significant factors. This problem is closely related to the concept of binary superimposed codes, which were introduced by Kautz and Singleton (IEEE Trans. Inform Theory 10 (4) (1964) 363) and were investigated by D'yachkov and Rykov (Problems Control Inform. Theory 12 (4) (1983) 229), Erdos et al. (Israel J. Math. 51 (1–2) (1985) 75), Ruszinko (J. Combin. Theory Ser. A 66 (1994) 302) and Furedi (J. Combin. Theory Ser. A 73 (1996) 172). Our goal is to prove a lower bound on the search length and to construct the optimal superimposed codes and search designs. The preliminary results have been published by D'yachkov and Rykov (Conference on Computer Science & Engineering Technology, Yerevan, Armenia, September 1997, p. 242).  相似文献   
28.
Cox LA 《Risk analysis》2012,32(7):1244-1252
Simple risk formulas, such as risk = probability × impact, or risk = exposure × probability × consequence, or risk = threat × vulnerability × consequence, are built into many commercial risk management software products deployed in public and private organizations. These formulas, which we call risk indices, together with risk matrices, “heat maps,” and other displays based on them, are widely used in applications such as enterprise risk management (ERM), terrorism risk analysis, and occupational safety. But, how well do they serve to guide allocation of limited risk management resources? This article evaluates and compares different risk indices under simplifying conditions favorable to their use (statistically independent, uniformly distributed values of their components; and noninteracting risk‐reduction opportunities). Compared to an optimal (nonindex) approach, simple indices produce inferior resource allocations that for a given cost may reduce risk by as little as 60% of what the optimal decisions would provide, at least in our simple simulations. This article suggests a better risk reduction per unit cost index that achieves 98–100% of the maximum possible risk reduction on these problems for all budget levels except the smallest, which allow very few risks to be addressed. Substantial gains in risk reduction achieved for resources spent can be obtained on our test problems by using this improved index instead of simpler ones that focus only on relative sizes of risk (or of components of risk) in informing risk management priorities and allocating limited risk management resources. This work suggests the need for risk management tools to explicitly consider costs in prioritization activities, particularly in situations where budget restrictions make careful allocation of resources essential for achieving close‐to‐maximum risk‐reduction benefits.  相似文献   
29.
30.
利用多路选择器网络可以实现任意逻辑函数的原理和布尔代数运算,提出了基于逻辑函数不相交的简化的积之和形式的数字多路选择器树形网络设计的一种代数方法,该方法可以使待设计的数字多路选择器网络化简到最小树形网络。给出的设计实例说明了该方法是有效的,容易实现数字多路选择器网络的自动综合。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号