首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   276篇
  免费   5篇
  国内免费   4篇
管理学   10篇
民族学   2篇
人口学   1篇
丛书文集   25篇
理论方法论   3篇
综合类   180篇
社会学   5篇
统计学   59篇
  2023年   1篇
  2021年   2篇
  2020年   4篇
  2019年   3篇
  2018年   5篇
  2017年   9篇
  2016年   8篇
  2015年   6篇
  2014年   13篇
  2013年   24篇
  2012年   15篇
  2011年   18篇
  2010年   19篇
  2009年   13篇
  2008年   13篇
  2007年   14篇
  2006年   14篇
  2005年   26篇
  2004年   18篇
  2003年   18篇
  2002年   10篇
  2001年   5篇
  2000年   6篇
  1999年   5篇
  1998年   1篇
  1997年   2篇
  1996年   3篇
  1994年   3篇
  1992年   1篇
  1989年   2篇
  1987年   3篇
  1981年   1篇
排序方式: 共有285条查询结果,搜索用时 437 毫秒
221.
中英文之间的不可译现象分别存在于语言系统、物质文化以及社会文化几个方面。人类文化在个性之外的共性,以及全球化背景下的文化交流与融合,为不可译性向可译性的转化提供了客观条件。语言系统内的翻译难题,如修辞格,可以借助于其它修辞手法来体现,用一种或多种修辞手法来重塑原文的修辞效果。意译、音译加注、改译及零翻译等方法可以应对其它方面的翻译难题。  相似文献   
222.
In this study we consider the problem of the improvement of the sample mean in the second order minimax estimation sense for a mean belonging to an unrestricted mean parameter space R+R+. We solve this problem for the class of natural exponential families (NEF's) whose variance functions (VF's) are regular at zero and at infinity. Such a class of VF's (or NEF's) is huge and contains (among others): Polynomial VF's (e.g., quadratic VF's in the Morris class, cubic VF's in the Letac&Mora class and VF's in the Hinde–Demétrio class); VF's belonging to the Tweedie class with power VF's, VF's belonging to the Babel class and many others. Moreover, we show that if the canonical parameter space of the corresponding NEF is RR (which is obviously the case if the support of the NEF is bounded), then the sample mean as an estimator of the mean cannot be further improved. This work presents an original constructive methodology and provides with constructive tools enabling to obtain explicit forms of the second order minimax estimators as well as the forms of the related weight functions. Our work establishes a substantial generalization of the results obtained so far in the literature. Illustrations of the resulting methods are provided and a simulation-based analysis is presented for the negative binomial case.  相似文献   
223.
Multivariate surveillance is of interest in many areas such as industrial production, bioterrorism detection, spatial surveillance, and financial transaction strategies. Some of the suggested approaches to multivariate surveillance have been multivariate counterparts to the univariate Shewhart, EWMA, and CUSUM methods. Our emphasis is on the special challenges of evaluating multivariate surveillance methods. Some new measures are suggested and the properties of several measures are demonstrated by applications to various situations. It is demonstrated that zero-state and steady-state ARL, which are widely used in univariate surveillance, should be used with care in multivariate surveillance.  相似文献   
224.
因聚焦模式即叙述眼光、叙述声音、以及叙述者对人物心理介入程度的变化,使史传文本《西门豹治邺》和话本小说《乔势天师禳旱魃,秉承县令召甘霖》在主要人物形象塑造和叙事情节结构发展上,有着极为明显的叙事效应差异。传统叙事模式有不断丰富发展的历史过程,不同文体有各自的叙述习惯,不能一概而论为"零聚焦叙事模式"。  相似文献   
225.
姚小鸥  李拓 《云梦学刊》2011,32(2):46-49
丛书集成初编本《离骚草木疏》,为该书现有唯一标点本,但该本有一些断句错误,且使用旧式标点,对今人阅读理解有一定影响。  相似文献   
226.
The protection and safe operations of power systems heavily rely on the identification of the causes of damage and service disruption. This article presents a general framework for the assessment of power system vulnerability to malicious attacks. The concept of susceptibility to an attack is employed to quantitatively evaluate the degree of exposure of the system and its components to intentional offensive actions. A scenario with two agents having opposing objectives is proposed, i.e., a defender having multiple alternatives of protection strategies for system elements, and an attacker having multiple alternatives of attack strategies against different combinations of system elements. The defender aims to minimize the system susceptibility to the attack, subject to budget constraints; on the other hand, the attacker aims to maximize the susceptibility. The problem is defined as a zero‐sum game between the defender and the attacker. The assumption that the interests of the attacker and the defender are opposite makes it irrelevant whether or not the defender shows the strategy he/she will use. Thus, the approaches “leader–follower game” or “simultaneous game” do not provide differences as far as the results are concerned. The results show an example of such a situation, and the von Neumann theorem is applied to find the (mixed) equilibrium strategies of the attacker and of the defender.  相似文献   
227.
A scan statistic is proposed for the prospective monitoring of spatiotemporal count data with an excess of zeros. The method that is based on an outbreak model for the zero‐inflated Poisson distribution is shown to be superior to traditional scan statistics based on the Poisson distribution in the presence of structural zeros. The spatial accuracy and the detection timeliness of the proposed scan statistic are investigated by means of simulation, and an application on the weekly cases of Campylobacteriosis in Germany illustrates how the scan statistic could be used to detect emerging disease outbreaks. An implementation of the method is provided in the open‐source R package scanstatistics available on the Comprehensive R Archive Network.  相似文献   
228.
在随机前沿模型中引入空间效应和技术无效率项的非连续性并构建了空间零无效率随机前沿模型,使用极大似然估计和JLMS方法得出参数和技术效率的估计。蒙特卡罗模拟表明:(1)逆似然比检验能以较高的准确率识别真实模型;(2)本方法在参数估计和技术效率的估计两方面均表现较好;(3)若真实模型为空间零无效率随机前沿模型但误用了空间随机前沿模型,参数估计和技术效率的估计两方面均表现较差。空间零无效率随机前沿模型有其存在的必要性。  相似文献   
229.
通过计算。证明了单位圆内一类满足条件^-limr→1 lnT(r,f)/lnln[1/(1-r)]=k,2〈k〈∞的零级亚纯函数关于其小函数的Borel点的存在性.  相似文献   
230.
随着全球经济一体化步伐的加快,计算机信息技术的逐步完善,我国企业已融入国际市场的竞争。如何提高企业竞争的优势,除了采用新技术外,还应挖掘“第三利润源泉”,建立新的物流控制体系,调整企业库存结构,采用网上购物,实施物流配送,减少企业内部库存量,逐步实现零库存或少库存,从而降低物流成本和生产成本,达到提高企业经济效益的目的。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号