首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   326篇
  免费   15篇
  国内免费   6篇
管理学   17篇
劳动科学   1篇
民族学   3篇
人口学   12篇
丛书文集   16篇
理论方法论   19篇
综合类   162篇
社会学   76篇
统计学   41篇
  2024年   2篇
  2023年   7篇
  2022年   1篇
  2021年   2篇
  2020年   13篇
  2019年   10篇
  2018年   16篇
  2017年   7篇
  2016年   4篇
  2015年   20篇
  2014年   19篇
  2013年   51篇
  2012年   10篇
  2011年   11篇
  2010年   16篇
  2009年   13篇
  2008年   19篇
  2007年   12篇
  2006年   16篇
  2005年   26篇
  2004年   13篇
  2003年   16篇
  2002年   9篇
  2001年   17篇
  2000年   5篇
  1999年   2篇
  1998年   2篇
  1997年   2篇
  1995年   2篇
  1994年   2篇
  1992年   1篇
  1986年   1篇
排序方式: 共有347条查询结果,搜索用时 359 毫秒
11.
教育资源闲置是教育资源完全或部分没有发挥教育功能的状态,具有绝对闲置和相对闲置两种含义。文章以百色农村教育资源为例,分析了广西边远地区农村教育资源闲置在小学和初中两个层面的表现,并分析了造成广西边远地区农村教育资源闲置的原因;文章认为,提高广西边远地区农村经济发展水平、拓宽融资渠道、优化教育资源配置、灵活撤并教学点、改变闲置校舍的用途以及合理解决代课教师问题是解决广西边远地区农村教育资源闲置问题的可能途径。  相似文献   
12.
What factors determine whether and how deeply countries will commit to the international human rights regime? Using data for up to 142 countries between 1966 and 2000, this article analyzes patterns of membership to the International Human Rights Covenants. The analysis produced two main conclusions. First, the potential costs associated with joining a treaty, rather than its substantive content, motivates the decision to join. Treaties that protect different rights but establish comparable implementation mechanisms exhibit similar patterns of membership, whereas treaties that protect identical rights but establish different implementation provisions exhibit dissimilar patterns of membership. Second, rates of treaty membership differ by level of commitment. Countries that sign human rights treaties differ from countries that ratify. Results are interpreted with respect to four theories of commitment and compliance: realism, liberalism, constructivism, and sociological institutionalism. Theories that emphasize the importance of a treaty’s costs (realism and institutionalism) fare better than theories that prioritize a treaty’s content (liberalism and constructivism).  相似文献   
13.
Surveillance to detect changes of spatial patterns is of interest in many areas such as environmental control and regional analysis. Here the interaction parameter of the Ising model, is considered. A minimal sufficient statistic and its asymptotic distribution are used. It is demonstrated that the convergence to normal, distribution is rapid. The main result is that when the lattice is large, all approximations are better in several respects. It is shown that, for large lattice sizes, earlier results on surveillance of a normally distributed random variable can be used in cases of most interest. The expected delay of alarm at a fixed level of false alarm probability is examined for some examples.  相似文献   
14.
Stakeholders making decisions in public health and world trade need improved estimations of the burden‐of‐illness of foodborne infectious diseases. In this article, we propose a Bayesian meta‐analysis or more precisely a Bayesian evidence synthesis to assess the burden‐of‐illness of campylobacteriosis in France. Using this case study, we investigate campylobacteriosis prevalence, as well as the probabilities of different events that guide the disease pathway, by (i) employing a Bayesian approach on French and foreign human studies (from active surveillance systems, laboratory surveys, physician surveys, epidemiological surveys, and so on) through the chain of events that occur during an episode of illness and (ii) including expert knowledge about this chain of events. We split the target population using an exhaustive and exclusive partition based on health status and the level of disease investigation. We assume an approximate multinomial model over this population partition. Thereby, each observed data set related to the partition brings information on the parameters of the multinomial model, improving burden‐of‐illness parameter estimates that can be deduced from the parameters of the basic multinomial model. This multinomial model serves as a core model to perform a Bayesian evidence synthesis. Expert knowledge is introduced by way of pseudo‐data. The result is a global estimation of the burden‐of‐illness parameters with their accompanying uncertainty.  相似文献   
15.
Although most surveillance studies scholars assume privacy is antithetical to surveillance, critics have recently warned that privacy-based criticisms may facilitate surveillance. That being said, we do not yet have data that show whether privacy claims were used in the past to legitimate government surveillance. This paper addresses that gap by analyzing claims made over one of the U.S.’s most controversial surveillance issues: government control over encryption technologies. A review of Congressional hearings and statements on the Congressional Record (n?=?112) reveals that from 1993 to 1999, public debates were dominated by a market liberalization discourse in which participants supported loosening encryption controls as a way to protect privacy from criminal intrusions in market transactions. Also playing a role was a strong skepticism toward government power and a preference for markets as managers of crime prevention. Challenged by these critiques, lawmakers withdrew regulatory proposals and spent the following decade working quietly with private firms to ensure law enforcement surveillance capability. These findings show the expansion of privacy for consumers and entrepreneurs has in fact been used to achieve the contraction of privacy from law enforcement and intelligence agencies.  相似文献   
16.
ABSTRACT

This paper considers how personal data protections figure into the design process of wearable technology. The data question is becoming especially important in the face of recent innovations in biotechnology that capitalize on the new fungibility of biology and electronics, in which new biotech wearables capitalize on the ability to analyze and track changes in blood, sweat, and tears. Interviews and participant observation with wearable tech designers, data scientists, fashion tech entrepreneurs, and select experts in cybersecurity and intellectual property law, reveal a range of approaches to data protection in design within the culture where wearables are beginning to merge with biotech. While a few respondents were extremely vigilant about protecting consumer’s privacy, the majority felt that when consumers ‘opt in’ to data sharing, they should be cognizant of the risks. From their perspective, it is not necessarily the producer’s responsibility to protect user's personal data. These attitudes present a problematic logic, which leaves users vulnerable to data exploitation. The paper concludes by arguing that this laissez-faire culture is the environment in which wearable biotech is being developed and will be deployed. This emerging technology raises issues about bodies, data, and ownership in crucial need of analysis and critique to push its move into the mainstream toward more equitable and inclusive ends.  相似文献   
17.
《Sociological Forum》2018,33(1):73-94
Based on ethnographic data on South Asian Muslims in Los Angeles and analysis of publications of the largest Muslim organization in North America, this article shows how Muslim Americans manage their hypervisibility in the post‐9/11 security atmosphere, which has intensified after ISIS terrorist attacks at home and abroad. At the individual level, Muslim Americans try to distance themselves from the “Muslim” label, which associates them with “terrorists.” Instead, many self‐categorize into the seemingly more favorable “moderate” identity, which could sometimes render Muslims politically passive. Contrastingly, Muslim organizations strive to construct a “Muslim American” identity that can allow Muslims to engage in mainstream politics by reframing Islam as compatible with American values. Theoretically, this article engages with the scholarship on security, surveillance, and visibility to show how the observed's visibility is not always only repressive but can also be used to resist imposed categories. However, findings reflect how the racialization of Muslims and the security regime give these strategies a double edge—while providing some advantages, these do little to dismantle Muslims’ hypervisibility and the security atmosphere. Overall, findings shed light on the contemporary issue of Muslim identification—not just in terms of how others see Muslims but also how Muslims see themselves.  相似文献   
18.
唐代遭受迁徙、贬谪之苦的众多诗人所创作的“迁谪诗文” ,是唐代文学不可或缺的重要组成部分。唐代的迁谪诗文颇能体现出迁谪文学的本质特点 ,对后世的迁谪文学的发展亦产生了深远的影响。  相似文献   
19.
以 5 0年代 15 6项工程建设为开端 ,到 90年代西部大开发战略的实施 ,国家对西部地区已进行了三次大规模的开发建设。前两次西部开发是在毛泽东区域经济均衡发展战略思想指导下进行的 ,对于促进中国工业化建设 ,加快西部地区的发展起了重要作用。目前正在实施的西部大开发是在邓小平“两个大局”思想指导下 ,第三代领导集体为实现现代化建设第三步目标而采取的重大战略步骤。由于时代主题和所处国际环境的变化 ,这次西部大开发应有新的思路和新的举措  相似文献   
20.
为了实现大型运行设备群的远程监控,提出了基于以太网络的空气压缩机站远程监控系统设计方案。系统基于以太网络技术构成空气压缩机站信息传输网络体系,实现了空气压缩机运行过程的远程网络化监测与控制。通过该系统,能及时了解和观察关键设备的工作状态及各种运行参数,为设备的管理和维护提供了保障。论述了系统硬件的组成、实现方法以及专家系统在系统中的应用。最后就基于组态软件的系统应用软件的设计与开发进行了阐述。实际运行表明,系统运行稳定,操作方便,能有效减少设备维修量,保证了供风质量,达到了设计要求。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号