首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   114篇
  免费   1篇
管理学   15篇
民族学   1篇
人口学   6篇
理论方法论   1篇
社会学   20篇
统计学   72篇
  2023年   2篇
  2022年   1篇
  2021年   1篇
  2020年   5篇
  2019年   7篇
  2018年   9篇
  2017年   10篇
  2016年   1篇
  2015年   4篇
  2014年   5篇
  2013年   31篇
  2012年   5篇
  2011年   3篇
  2010年   2篇
  2009年   2篇
  2008年   3篇
  2007年   4篇
  2006年   2篇
  2003年   1篇
  2002年   2篇
  2001年   1篇
  2000年   2篇
  1999年   1篇
  1998年   3篇
  1992年   1篇
  1990年   2篇
  1989年   1篇
  1986年   1篇
  1985年   1篇
  1983年   1篇
  1982年   1篇
排序方式: 共有115条查询结果,搜索用时 15 毫秒
1.
The plant ‘Heat Rate’ (HR) is a measure of overall efficiency of a thermal power generating system. It depends on a large number of factors, some of which are non-measurable, while data relating to others are seldom available and recorded. However, coal quality (expressed in terms of ‘effective heat value’ (EHV) as kcal/kg) transpires to be one of the important factors that influences HR values and data on EHV are available in any thermal power generating system. In the present work, we propose a prediction interval of the HR values on the basis of only EHV, keeping in mind that coal quality is one of the important (but not the only) factors that have a pronounced effect on the combustion process and hence on HR. The underlying theory borrows the idea of providing simultaneous confidence interval (SCI) to the coefficients of a p-th p(≥1) order autoregressive model (AR(p)). The theory has been substantiated with the help of real life data from a power utility (after suitable base and scale transformation of the data to maintain the confidentiality of the classified document). Scope for formulating strategies to enhance the economy of a thermal power generating system has also been explored.  相似文献   
2.
This article presents a framework for economic consequence analysis of terrorism countermeasures. It specifies major categories of direct and indirect costs, benefits, spillover effects, and transfer payments that must be estimated in a comprehensive assessment. It develops a spreadsheet tool for data collection, storage, and refinement, as well as estimation of the various components of the necessary economic accounts. It also illustrates the usefulness of the framework in the first assessment of the tradeoffs between enhanced security and changes in commercial activity in an urban area, with explicit attention to the role of spillover effects. The article also contributes a practical user interface to the model for emergency managers.  相似文献   
3.
One of the most pervasive aspects of Delhi’s post-liberalization psychopathology has been everyday violence against women. The city’s rape culture was given an exceptionally sharp global focus after the horrific gang rape of Jyoti Singh on December 16, 2012. Recent Hindi cinema has begun to engage with some aspects of the capital’s misogynist urban ethos. In this paper, I look at how the Delhi subgenre of the “multiplex film” has engaged with rape culture, misogyny, and urban anxiety through a close textual and discursive analysis of two recent films—NH10 (Navdeep Singh, 2015) and Pink (Aniruddha Roy Chowdhury, 2016). Specifically, I identify how the December 16 “trigger event” and Delhi’s notorious misogyny are finding newer modes of representation through the interplay of genre and exhibition space. In what ways do these films position and imagine the “multiplex viewer”? New engagements with the figure of the consuming middle-class woman and the public discourses that surround her sexual safety and navigation of space have taken a central position in understanding the present urban psychosis of the capital. I suggest that these films and the forms of spectatorial identification that they privilege are intricately linked to the gendered spatial politics of the multiplex.  相似文献   
4.
Standard errors of the coefficients of a logistic regression (a binary response model) based on the asymptotic formula are compared to those obtained from the bootstrap through Monte Carlo simulations. The computer intensive bootstrap method, a nonparametric alternative to the asymptotic estimate, overestimates the true value of the standard errors while the asymptotic formula underestimates it. However, for small samples the bootstrap estimates are substantially closer to the true value than their counterpart derived from the asymptotic formula. The methodology is discussed using two illustrative data sets. The first example deals with a logistic model explaining the log-odds of passing the ERA amendment by the 1982 deadline as a function of percent of women legislators and the percent vote for Reagan. In the second example, the probability that an ingot is ready to roll is modelled using heating time and soaking time as explanatory variables. The results agree with those obtained from the simulations. The value of the study to better decision making through accurate statistical inference is discussed.  相似文献   
5.
Conventional advice is to reduce risky investments as one ages. Such a generalized focus on risk avoidance may be inappropriate for elderly with longer life spans and those with financial goals that extend beyond their lifetime. To better understand risky asset holdings among the elderly, we investigated the effect of cognitive ability and bequest motive on stock ownership and stock purchase. Using the 2004 wave of the Health and Retirement Study, we found that one-third of elderly households held stocks and 36% of those elderly stockowners had recently acquired stocks. The respondent??s cognitive ability and bequest motive were strongly related to stock ownership. Among those who owned stock, a bequest motive was positively related to a recent purchase of stocks.  相似文献   
6.
Recent advances in statistical estimation theory have resulted in the development of new procedures, called robust methods, that can be used to estimate the coefficients of a regression model. Because such methods take into account the impact of discrepant data points during the initial estimation process, they offer a number of advantages over ordinary least squares and other analytical procedures (such as the analysis of outliers or regression diagnostics). This paper describes the robust method of analysis and illustrates its potential usefulness by applying the technique to two data sets. The first application uses artificial data; the second uses a data set analyzed previously by Tufte [15] and, more recently, by Chatterjee and Wiseman [6].  相似文献   
7.
8.
Conventional Phase II statistical process control (SPC) charts are designed using control limits; a chart gives a signal of process distributional shift when its charting statistic exceeds a properly chosen control limit. To do so, we only know whether a chart is out-of-control at a given time. It is therefore not informative enough about the likelihood of a potential distributional shift. In this paper, we suggest designing the SPC charts using p values. By this approach, at each time point of Phase II process monitoring, the p value of the observed charting statistic is computed, under the assumption that the process is in-control. If the p value is less than a pre-specified significance level, then a signal of distributional shift is delivered. This p value approach has several benefits, compared to the conventional design using control limits. First, after a signal of distributional shift is delivered, we could know how strong the signal is. Second, even when the p value at a given time point is larger than the significance level, it still provides us useful information about how stable the process performs at that time point. The second benefit is especially useful when we adopt a variable sampling scheme, by which the sampling time can be longer when we have more evidence that the process runs stably, supported by a larger p value. To demonstrate the p value approach, we consider univariate process monitoring by cumulative sum control charts in various cases.  相似文献   
9.
Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity.  相似文献   
10.
Several extensions of the popular E(s 2) criterion of Booth and Cox (1962 Booth , K. H. V. , Cox , D. R. ( 1962 ). Some systematic supersaturated designs . Technometrics 4 : 489495 .[Taylor & Francis Online], [Web of Science ®] [Google Scholar]) to multilevel supersaturated designs have been advanced in literature. These extensions are not unique due to different ways they measure overall nonorthogonality between all pairs of the columns of the model matrix. We exploit the connection of the E(s 2) criterion with A- and D-optimality that naturally lends itself to a generalized criterion for the multilevel situation in a unified way. The extensions provided in literature follow as special cases of the generalized criterion. A lower bound to the generalized criterion is derived for a wide class of designs, and a method of construction for the symmetrical case is discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号