首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1148篇
  免费   44篇
  国内免费   20篇
管理学   365篇
民族学   1篇
人才学   1篇
人口学   24篇
丛书文集   51篇
理论方法论   50篇
综合类   414篇
社会学   119篇
统计学   187篇
  2024年   3篇
  2023年   16篇
  2022年   14篇
  2021年   9篇
  2020年   30篇
  2019年   42篇
  2018年   40篇
  2017年   40篇
  2016年   41篇
  2015年   49篇
  2014年   73篇
  2013年   132篇
  2012年   67篇
  2011年   72篇
  2010年   63篇
  2009年   62篇
  2008年   60篇
  2007年   65篇
  2006年   56篇
  2005年   42篇
  2004年   43篇
  2003年   44篇
  2002年   22篇
  2001年   23篇
  2000年   18篇
  1999年   14篇
  1998年   9篇
  1997年   10篇
  1996年   5篇
  1995年   10篇
  1994年   5篇
  1993年   12篇
  1992年   6篇
  1991年   4篇
  1990年   5篇
  1989年   1篇
  1988年   1篇
  1987年   2篇
  1986年   1篇
  1983年   1篇
排序方式: 共有1212条查询结果,搜索用时 46 毫秒
1.
Damage models for natural hazards are used for decision making on reducing and transferring risk. The damage estimates from these models depend on many variables and their complex sometimes nonlinear relationships with the damage. In recent years, data‐driven modeling techniques have been used to capture those relationships. The available data to build such models are often limited. Therefore, in practice it is usually necessary to transfer models to a different context. In this article, we show that this implies the samples used to build the model are often not fully representative for the situation where they need to be applied on, which leads to a “sample selection bias.” In this article, we enhance data‐driven damage models by applying methods, not previously applied to damage modeling, to correct for this bias before the machine learning (ML) models are trained. We demonstrate this with case studies on flooding in Europe, and typhoon wind damage in the Philippines. Two sample selection bias correction methods from the ML literature are applied and one of these methods is also adjusted to our problem. These three methods are combined with stochastic generation of synthetic damage data. We demonstrate that for both case studies, the sample selection bias correction techniques reduce model errors, especially for the mean bias error this reduction can be larger than 30%. The novel combination with stochastic data generation seems to enhance these techniques. This shows that sample selection bias correction methods are beneficial for damage model transfer.  相似文献   
2.
对 2 0 0 1— 2 0 0 2赛季CBA与NBA各项技术进行了统计比较与分析 ,建议CBA在应有的基础上继续努力 ,提高球员的身体素质和技术能力 .  相似文献   
3.
邪教活动是一种反人类、反科学、反政府的极端行为 ,是社会的一大公害。要打击和防范并最终铲除邪教活动 ,首先要加速《反邪教法》的制定 ;其次 ,要依法取缔邪教组织和惩治邪教犯罪活动 ;第三 ,要建立常设性反邪教组织机构 ,做好日常的反邪教工作 ;第四 ,要坚持教育与惩罚相结合 ,团结教育绝大多数被蒙蔽而参加邪教活动的成员 ;最后要坚持标本兼治、以防为主的综合治理措施。  相似文献   
4.
Because of the inherent complexity of biological systems, there is often a choice between a number of apparently equally applicable physiologically based models to describe uptake and metabolism processes in toxicology or risk assessment. These models may fit the particular data sets of interest equally well, but may give quite different parameter estimates or predictions under different (extrapolated) conditions. Such competing models can be discriminated by a number of methods, including potential refutation by means of strategic experiments, and their ability to suitably incorporate all relevant physiological processes. For illustration, three currently used models for steady-state hepatic elimination--the venous equilibration model, the parallel tube model, and the distributed sinusoidal perfusion model--are reviewed and compared with particular reference to their application in the area of risk assessment. The ability of each of the models to describe and incorporate such physiological processes as protein binding, precursor-metabolite relations and hepatic zones of elimination, capillary recruitment, capillary heterogeneity, and intrahepatic shunting is discussed. Differences between the models in hepatic parameter estimation, extrapolation to different conditions, and interspecies scaling are discussed, and criteria for choosing one model over the others are presented. In this case, the distributed model provides the most general framework for describing physiological processes taking place in the liver, and has so far not been experimentally refuted, as have the other two models. These simpler models may, however, provide useful bounds on parameter estimates and on extrapolations and risk assessments.  相似文献   
5.
基于主动网的SYN攻击防御   总被引:1,自引:0,他引:1  
针对目前传统网防御TCP同步泛滥攻击的服务器主机、路由器过滤、防火墙方法的局限性,利用主动网的动态特性,提出一种基于主动网的同步泛滥防御机制,并通过仿真实验将它与传统网环境下的防火墙防御进行了性能比较和分析,结果表明主动网技术为同步泛滥攻击提供了良好的防御性能。  相似文献   
6.
A quantitative criterion for ranking the different scenarios of nuclear and radiological terrorism has been developed. The aim of the model is not to predict terroristic events but only to indicate which scenario has the higher utility from the point of view of a terroristic organization in terms of balance between factors favoring and discouraging the attack, respectively. All these factors were quantified according to a scoring system that takes into account the logarithmic relationship between perceptions and stimuli. The criterion was applied to several scenarios, each of which was modeled in a simple but not trivial way in order to estimate the expected damage in terms of probable life losses from both radiative and nonradiative effects. The outcome from the ranking method indicates that the attractive scenario appears to be the detonation of a low yield improvised nuclear device in the metropolitan area of a major city.  相似文献   
7.
中国的民间手工艺文化一直延续着中华本元文化的特征,保持了精神和物质统一的原生状态,同时包蕴了中华民族传统的自然观和思维方式,无论是其中的思想智慧还是造物工艺都为我们的现代设计在如何继承本土文化方面打开了一个可供吸收营养和借鉴的宝库。凤翔泥塑作为一种符号现象被现代设计加以运用,不能不说是民间传统手工艺术在现代的一次回归浪潮。文章探讨的是凤翔泥塑在纹饰、色彩、造型三个方面带给现代设计的启示。  相似文献   
8.
基于规则的客户关系管理系统建模方法   总被引:2,自引:0,他引:2  
客户关系管理系统(CRM)是提高企业核心竞争力的有力武器。以工作流和过程建模技术为基础,研究CRM系统的建模,是CRM系统的建立和顺畅运行的关键。因此,将动态过程建模的思想引入CRM系统的建模过程中,按照逐层分解的建模方式来简化系统的复杂性,并采用事件驱动的、基于扩展业务规则的方法进行CRM系统的过程建模和系统性能评价,是针对CRM系统进行建模的有效手段。通过以上方法,可以建立出全面支持CRM系统运行、监控、仿真和性能评价的过程模型。根据该方法建立的CRM系统的模型经过仿真实验和企业实际应用,证明具有良好的应用效果。  相似文献   
9.
Persuasive argumentation in negotiation   总被引:12,自引:0,他引:12  
  相似文献   
10.
In the history of warfare, there are a number of examples of strategic uses of asymmetric technologies. Consistent with history and theory, individuals, organizations and nations have spotted opportunities to employ information and communications technologies to gain and exploit asymmetric advantages and to counter asymmetric weaknesses. This article discusses various asymmetries associated with institutions, nations and organizations that influence the ICT-national security nexus. Regulative, normative and cognitive institutions in a country provide various mechanisms that affect the nature of positive and negative asymmetries. Nations and organizations also differ in terms of their capability to assimilate ICT tools to gain positive asymmetries and deal with vulnerabilities of negative asymmetries. Integrative approaches that combine policy and technological measures at various levels are likely to make the world more secure.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号