首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2274篇
  免费   121篇
管理学   275篇
民族学   25篇
人口学   296篇
丛书文集   4篇
理论方法论   177篇
综合类   34篇
社会学   1094篇
统计学   490篇
  2024年   5篇
  2023年   38篇
  2022年   41篇
  2021年   46篇
  2020年   111篇
  2019年   125篇
  2018年   171篇
  2017年   184篇
  2016年   165篇
  2015年   100篇
  2014年   132篇
  2013年   439篇
  2012年   159篇
  2011年   62篇
  2010年   52篇
  2009年   45篇
  2008年   56篇
  2007年   59篇
  2006年   37篇
  2005年   35篇
  2004年   31篇
  2003年   28篇
  2002年   21篇
  2001年   23篇
  2000年   18篇
  1999年   14篇
  1998年   17篇
  1997年   13篇
  1996年   15篇
  1995年   12篇
  1994年   10篇
  1993年   7篇
  1992年   12篇
  1991年   11篇
  1990年   12篇
  1989年   9篇
  1988年   7篇
  1987年   6篇
  1986年   6篇
  1985年   8篇
  1984年   5篇
  1983年   3篇
  1982年   9篇
  1981年   7篇
  1980年   8篇
  1978年   2篇
  1976年   4篇
  1975年   4篇
  1972年   2篇
  1968年   2篇
排序方式: 共有2395条查询结果,搜索用时 31 毫秒
11.
Social Indicators Research - This paper analyses the Human Development Index (HDI) time series from 2010 to 2017. An alternative index is studied, which combines the same components of the HDI by...  相似文献   
12.
A graph is locally irregular if the neighbors of every vertex v have degrees distinct from the degree of v. A locally irregular edge-coloring of a graph G is an (improper) edge-coloring such that the graph induced on the edges of any color class is locally irregular. It is conjectured that three colors suffice for a locally irregular edge-coloring. In the paper, we develop a method using which we prove four colors are enough for a locally irregular edge-coloring of any subcubic graph admiting such a coloring. We believe that our method can be further extended to prove the tight bound of three colors for such graphs. Furthermore, using a combination of existing results, we present an improvement of the bounds for bipartite graphs and general graphs, setting the best upper bounds to 7 and 220, respectively.  相似文献   
13.
14.
It is well-known that, under Type II double censoring, the maximum likelihood (ML) estimators of the location and scale parameters, θ and δ, of a twoparameter exponential distribution are linear functions of the order statistics. In contrast, when θ is known, theML estimator of δ does not admit a closed form expression. It is shown, however, that theML estimator of the scale parameter exists and is unique. Moreover, it has good large-sample properties. In addition, sharp lower and upper bounds for this estimator are provided, which can serve as starting points for iterative interpolation methods such as regula falsi. Explicit expressions for the expected Fisher information and Cramér-Rao lower bound are also derived. In the Bayesian context, assuming an inverted gamma prior on δ, the uniqueness, boundedness and asymptotics of the highest posterior density estimator of δ can be deduced in a similar way. Finally, an illustrative example is included.  相似文献   
15.
A dramatic change in fertility,family formation and living arrangements tookplace in the Czech Republic over the 1990s. Theestablishment of democracy, profound socialtransformation and transition to the marketeconomy affected the values and demographicbehaviour of the young Czech generation. Thispaper examines whether these demographic shiftscan be interpreted within the framework of thesecond demographic transition. The theoreticalpart discusses the idea of the transition,outlining three distinctive conceptualisations.Two of them – the view of the transition as aprogression of characteristic interrelateddemographic changes and a broader viewstressing the importance of underlyingideational factors – fit the Czech situationvery well. A comparison with the Netherlandsreveals that the onset of the transition in theCzech Republic may be clearly located in thefirst half of the 1990s, lagging two decadesbehind the Netherlands.  相似文献   
16.
17.
18.
19.
This article presents a framework for using probabilistic terrorism risk modeling in regulatory analysis. We demonstrate the framework with an example application involving a regulation under consideration, the Western Hemisphere Travel Initiative for the Land Environment, (WHTI‐L). First, we estimate annualized loss from terrorist attacks with the Risk Management Solutions (RMS) Probabilistic Terrorism Model. We then estimate the critical risk reduction, which is the risk‐reducing effectiveness of WHTI‐L needed for its benefit, in terms of reduced terrorism loss in the United States, to exceed its cost. Our analysis indicates that the critical risk reduction depends strongly not only on uncertainties in the terrorism risk level, but also on uncertainty in the cost of regulation and how casualties are monetized. For a terrorism risk level based on the RMS standard risk estimate, the baseline regulatory cost estimate for WHTI‐L, and a range of casualty cost estimates based on the willingness‐to‐pay approach, our estimate for the expected annualized loss from terrorism ranges from $2.7 billion to $5.2 billion. For this range in annualized loss, the critical risk reduction for WHTI‐L ranges from 7% to 13%. Basing results on a lower risk level that results in halving the annualized terrorism loss would double the critical risk reduction (14–26%), and basing the results on a higher risk level that results in a doubling of the annualized terrorism loss would cut the critical risk reduction in half (3.5–6.6%). Ideally, decisions about terrorism security regulations and policies would be informed by true benefit‐cost analyses in which the estimated benefits are compared to costs. Such analyses for terrorism security efforts face substantial impediments stemming from the great uncertainty in the terrorist threat and the very low recurrence interval for large attacks. Several approaches can be used to estimate how a terrorism security program or regulation reduces the distribution of risks it is intended to manage. But, continued research to develop additional tools and data is necessary to support application of these approaches. These include refinement of models and simulations, engagement of subject matter experts, implementation of program evaluation, and estimating the costs of casualties from terrorism events.  相似文献   
20.
Unfortunately many of the numerous algorithms for computing the comulative distribution function (cdf) and noncentrality parameter of the noncentral F and beta distributions can produce completely incorrect results as demonstrated in the paper by examples. Existing algorithms are scrutinized and those parts that involve numerical difficulties are identified. As a result, a pseudo code is presented in which all the known numerical problems are resolved. This pseudo code can be easily implemented in programming language C or FORTRAN without understanding the complicated mathematical background. Symbolic evaluation of a finite and closed formula is proposed to compute exact cdf values. This approach makes it possible to check quickly and reliably the values returned by professional statistical packages over an extraordinarily wide parameter range without any programming knowledge. This research was motivated by the fact that a very useful table for calculating the size of detectable effects for ANOVA tables contains suspect values in the region of large noncentrality parameter values compared to the values obtained by Patnaik’s 2-moment central-F approximation. The cause is identified and the corrected form of the table for ANOVA purposes is given. The accuracy of the approximations to the noncentral-F distribution is also discussed. The authors wish to thank Mr. Richárd Király for his preliminary work. The authors are grateful to the Editor and Associate Editor of STCO and the unknown reviewers for their helpful suggestions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号