全文获取类型
收费全文 | 532篇 |
免费 | 9篇 |
国内免费 | 6篇 |
专业分类
管理学 | 82篇 |
民族学 | 3篇 |
人口学 | 3篇 |
丛书文集 | 13篇 |
理论方法论 | 2篇 |
综合类 | 365篇 |
社会学 | 30篇 |
统计学 | 49篇 |
出版年
2024年 | 1篇 |
2023年 | 11篇 |
2022年 | 11篇 |
2021年 | 11篇 |
2020年 | 7篇 |
2019年 | 13篇 |
2018年 | 9篇 |
2017年 | 11篇 |
2016年 | 23篇 |
2015年 | 28篇 |
2014年 | 33篇 |
2013年 | 37篇 |
2012年 | 29篇 |
2011年 | 34篇 |
2010年 | 24篇 |
2009年 | 23篇 |
2008年 | 32篇 |
2007年 | 25篇 |
2006年 | 26篇 |
2005年 | 32篇 |
2004年 | 24篇 |
2003年 | 15篇 |
2002年 | 23篇 |
2001年 | 10篇 |
2000年 | 13篇 |
1999年 | 7篇 |
1998年 | 6篇 |
1997年 | 2篇 |
1996年 | 6篇 |
1995年 | 4篇 |
1994年 | 12篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1989年 | 1篇 |
1988年 | 2篇 |
排序方式: 共有547条查询结果,搜索用时 281 毫秒
431.
432.
基于PSO和SVM的上市公司财务危机预警模型 总被引:1,自引:0,他引:1
提出了一种将经过改进的离散粒子群(PSO)算法和支持向量机(SVM)相结合的算法,以选择最优的指标集并用于财务危机预警。将此算法应用于上市公司的数据,检验模型提前3年的预警效果,最后与常见的主成分分析方法与SVM相结合的模型进行对比,结果证明了PSO-SVM模型的合理性和优越性。 相似文献
433.
从实用的角度看,全自动、高质量的机器翻译是近期难以实现的目标。而受限辅助翻译系统是应用于特定用户与特定材料的人机互助式机器翻译,对受限辅助翻译系统的商品化研究与开发能够在近期内给人们的工作和生活带来更实际的帮助。 相似文献
434.
Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes
Empowered by virtualization technology, service requests from cloud users can be honored through creating and running virtual machines. Virtual machines established for different users may be allocated to the same physical server, making the cloud vulnerable to co‐residence attacks where a malicious attacker can steal a user's data through co‐residing their virtual machines on the same server. For protecting data against the theft, the data partition technique is applied to divide the user's data into multiple blocks with each being handled by a separate virtual machine. Moreover, early warning agents (EWAs) are deployed to possibly detect and prevent co‐residence attacks at a nascent stage. This article models and analyzes the attack success probability (complement of data security) in cloud systems subject to competing attack detection process (by EWAs) and data theft process (by co‐residence attackers). Based on the suggested probabilistic model, the optimal data partition and protection policy is determined with the objective of minimizing the user's cost subject to providing a desired level of data security. Examples are presented to illustrate effects of different model parameters (attack rate, number of cloud servers, number of data blocks, attack detection time, and data theft time distribution parameters) on the attack success probability and optimization solutions. 相似文献
435.
本文试图用交流观点 ,分析直流电机的几个关键问题 ,以期再一次认识电机的内在规律和相互联系 相似文献
436.
PVM的安全机制是决定其大规模部署可行性的一个重要因素,文中提出了一种增强PVM安全性的方案。它解决了在构成集群的各个计算机之间传递消息所面临的被窃听、篡改、伪造和重放的安全性问题,独立于具体的下层网络协议,消耗系统资源少,并且具有可动态配置的优点。 相似文献
437.
汽车后桥主锥总成综合检测和评判方法 总被引:2,自引:0,他引:2
介绍了一种自行设计制造的专用检测试验机,论述了汽车后桥主锥总成综合检测和评判方法。试验机模拟了汽车行驶时的工作状况,能自动检测主锥总成的预紧力矩、转动中的发卡和干扰、差速等参数值。以检测到的各项数据为依据,对立锥总成的整体性能作出综合评定,给出了评判结果,并提出工艺改进。 相似文献
438.
倪继烈 《电子科技大学学报(社会科学版)》2000,(5)
针对一种自行研制并投入实际应用的椭圆波导拉制机用计算机控制系统,介绍了其系统结构设计、功能设计与有关软、硬件的具体实现方法。该系统在单片机控制系统的控制下,自动完成椭圆波导电缆的拉制。经过试运行表明,系统能满足设计和使用要求。 相似文献
439.
Traditional phase III clinical trials are powered to detect an overall treatment effect. However, it has increasingly been shown that many treatments are effective only for a subset of a population. The adaptive signature design uses genomic/proteomic information to prospectively predict a subset of patients more sensitive to treatment. Tests for overall treatment effect and for treatment effect in the predicted subset are conducted. In this work properties of the adaptive signature design are investigated through simulation. It was found that models which excluded expression main effect terms had higher empirical power than models which included them. 相似文献
440.
Christian Beck 《Journal for Cultural Research》2016,20(4):334-349
This article argues that the Internet possesses the potential to challenge corporate and Statist domination of digital space. Mapping Gilles Deleuze and Felix Guattari’s concepts of the rhizome, smooth/striated space, and the nomad onto the idea of digital connectivity, I show how hacktivism can initiate change both online and off. In the first section, I argue that the Internet is characteristic of a rhizome. As a rhizome, the Internet’s structure affords it a flexible, morphological, and ultimately a vibrantly powerful configuration. As a result of its connective and generative power, corporate and State entities seek to control digital space. These controlling institutions stratify, segment, and claim ownership over the flat, smooth space. The second section, then, shows how the Internet becomes striated through corporate and State interests. As a remedy, the third section advocates for hacktivism as a form of nomadic action. In this section, I focus on the Distributed Denial of Service attack as a form of deterritorialization that redistributes the flow of information. Acting as a digital machine de guerre engaging in online direct action, and against the legal apparatus of the State, hacktivists create a rupture in the rhizomatic structure and form smooth spaces within a striated network. In the final section, I advocate for sustained smooth digital spaces that allow for new modes of association that radiate outward from the digital to the physical world. 相似文献