全文获取类型
收费全文 | 1829篇 |
免费 | 61篇 |
国内免费 | 37篇 |
专业分类
管理学 | 464篇 |
民族学 | 4篇 |
人才学 | 1篇 |
人口学 | 14篇 |
丛书文集 | 118篇 |
理论方法论 | 26篇 |
综合类 | 1070篇 |
社会学 | 20篇 |
统计学 | 210篇 |
出版年
2024年 | 9篇 |
2023年 | 21篇 |
2022年 | 36篇 |
2021年 | 29篇 |
2020年 | 39篇 |
2019年 | 42篇 |
2018年 | 38篇 |
2017年 | 50篇 |
2016年 | 48篇 |
2015年 | 74篇 |
2014年 | 80篇 |
2013年 | 139篇 |
2012年 | 118篇 |
2011年 | 118篇 |
2010年 | 108篇 |
2009年 | 120篇 |
2008年 | 110篇 |
2007年 | 111篇 |
2006年 | 100篇 |
2005年 | 94篇 |
2004年 | 92篇 |
2003年 | 66篇 |
2002年 | 64篇 |
2001年 | 49篇 |
2000年 | 42篇 |
1999年 | 26篇 |
1998年 | 17篇 |
1997年 | 21篇 |
1996年 | 12篇 |
1995年 | 18篇 |
1994年 | 9篇 |
1993年 | 3篇 |
1992年 | 7篇 |
1991年 | 5篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 2篇 |
1987年 | 3篇 |
排序方式: 共有1927条查询结果,搜索用时 15 毫秒
1.
Integrating Operational and Organizational Aspects in Interdependent Infrastructure Network Recovery
Camilo Gomez Andrs D. Gonzlez Hiba Baroud Claudia D. Bedoya‐Motta 《Risk analysis》2019,39(9):1913-1929
Managing risk in infrastructure systems implies dealing with interdependent physical networks and their relationships with the natural and societal contexts. Computational tools are often used to support operational decisions aimed at improving resilience, whereas economics‐related tools tend to be used to address broader societal and policy issues in infrastructure management. We propose an optimization‐based framework for infrastructure resilience analysis that incorporates organizational and socioeconomic aspects into operational problems, allowing to understand relationships between decisions at the policy level (e.g., regulation) and the technical level (e.g., optimal infrastructure restoration). We focus on three issues that arise when integrating such levels. First, optimal restoration strategies driven by financial and operational factors evolve differently compared to those driven by socioeconomic and humanitarian factors. Second, regulatory aspects have a significant impact on recovery dynamics (e.g., effective recovery is most challenging in societies with weak institutions and regulation, where individual interests may compromise societal well‐being). And third, the decision space (i.e., available actions) in postdisaster phases is strongly determined by predisaster decisions (e.g., resource allocation). The proposed optimization framework addresses these issues by using: (1) parametric analyses to test the influence of operational and socioeconomic factors on optimization outcomes, (2) regulatory constraints to model and assess the cost and benefit (for a variety of actors) of enforcing specific policy‐related conditions for the recovery process, and (3) sensitivity analyses to capture the effect of predisaster decisions on recovery. We illustrate our methodology with an example regarding the recovery of interdependent water, power, and gas networks in Shelby County, TN (USA), with exposure to natural hazards. 相似文献
2.
针对ELAN嵌入式网络微机控制系统中的实时性问题,给出了ELAN网络系统中的通信处理时间的测量方法,并对网络中的通信处理时间进行了分析,最后提出了代码下装的方法。 相似文献
3.
OLIVIER CAPPÉ RANDAL DOUC ERIC MOULINES & CHRISTIAN ROBERT 《Scandinavian Journal of Statistics》2002,29(4):615-635
While much used in practice, latent variable models raise challenging estimation problems due to the intractability of their likelihood. Monte Carlo maximum likelihood (MCML), as proposed by Geyer & Thompson (1992 ), is a simulation-based approach to maximum likelihood approximation applicable to general latent variable models. MCML can be described as an importance sampling method in which the likelihood ratio is approximated by Monte Carlo averages of importance ratios simulated from the complete data model corresponding to an arbitrary value of the unknown parameter. This paper studies the asymptotic (in the number of observations) performance of the MCML method in the case of latent variable models with independent observations. This is in contrast with previous works on the same topic which only considered conditional convergence to the maximum likelihood estimator, for a fixed set of observations. A first important result is that when is fixed, the MCML method can only be consistent if the number of simulations grows exponentially fast with the number of observations. If on the other hand, is obtained from a consistent sequence of estimates of the unknown parameter, then the requirements on the number of simulations are shown to be much weaker. 相似文献
4.
韩立军 《内蒙古工业大学学报》2002,21(1):50-52
本文给出一类非均匀弦的横向振动的最佳控制,推广了P C Park的结果。这一结果同样适用于同类型振动问题。 相似文献
5.
文章有两大基本特点:对波普诘难历史决定论的质疑是从政治学这个独特视角进行的;对波普诘难历史决定论的质疑主要是针对哲学界较少关注的几个观点。这些观点包括波普过分推崇讧伪的方法,贬低和轻视证实方法的观点;波普认为整体主义不能建设一个适合于人们生活的新社会,只能建设一个使人适合于他的新社会的观点;波普认为渐进工程工程师在改革范围内可以不抱成见提出自己问题的观点。对于这些观点,文章借用罗尔斯、阿尔蒙德、伊斯顿、科恩、熊彼得、林尚立等的观点和理论对其进行了深入的剖析。 相似文献
6.
张日美 《北京交通大学学报(社会科学版)》2008,7(2):104-108
将无抵触理论应用于公共英语教学,可以对外语学习活动进行设计,使学习者水平与任务的难度相当、培养语言学习兴趣、加强师生交流、确保学习者获得学习主动权等,使其在学习过程中体验到巨大乐趣,进入以注意力高度集中和全身心投入为特征的无抵触心理状态,提高学习效率。 相似文献
7.
陈忠 《长江大学学报(社会科学版)》2003,(2)
提出了一种求解等式约束优化问题的异步并行拟牛顿方法 .若假设目标函数 f和约束函数h至少三次连续可微 ,且△h(x)对任意x∈Rn 均为满秩矩阵 ,证明了所提出的异步并行算法是 q—超线性收敛的 . 相似文献
8.
9.
We describe an image reconstruction problem and the computational difficulties arising in determining the maximum a posteriori (MAP) estimate. Two algorithms for tackling the problem, iterated conditional modes (ICM) and simulated annealing, are usually applied pixel by pixel. The performance of this strategy can be poor, particularly for heavily degraded images, and as a potential improvement Jubb and Jennison (1991) suggest the cascade algorithm in which ICM is initially applied to coarser images formed by blocking squares of pixels. In this paper we attempt to resolve certain criticisms of cascade and present a version of the algorithm extended in definition and implementation. As an illustration we apply our new method to a synthetic aperture radar (SAR) image. We also carry out a study of simulated annealing, with and without cascade, applied to a more tractable minimization problem from which we gain insight into the properties of cascade algorithms. 相似文献
10.
提出了一种基于移动代理的新型分布式入侵检测系统。该系统是针对广域网环境专门设计的,数据的处理通过各节点所设置的代理来进行分布式计算,不仅能实现全网络范围内的入侵检测功能,具有良好的可移植性;而且对网络系统和主机的资源占用较低,减少了出现网络瓶颈的可能。还建立了移动代理的新型分布式入侵检测系统的体系结构和理论分析模型,并讨论了该系统的维护更新机制。 相似文献