首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15953篇
  免费   938篇
  国内免费   147篇
管理学   1727篇
劳动科学   2篇
民族学   118篇
人才学   1篇
人口学   403篇
丛书文集   1002篇
理论方法论   545篇
综合类   8887篇
社会学   1306篇
统计学   3047篇
  2024年   13篇
  2023年   143篇
  2022年   119篇
  2021年   173篇
  2020年   325篇
  2019年   387篇
  2018年   430篇
  2017年   546篇
  2016年   464篇
  2015年   553篇
  2014年   879篇
  2013年   1787篇
  2012年   1135篇
  2011年   1109篇
  2010年   891篇
  2009年   851篇
  2008年   950篇
  2007年   1039篇
  2006年   967篇
  2005年   836篇
  2004年   722篇
  2003年   613篇
  2002年   513篇
  2001年   376篇
  2000年   277篇
  1999年   165篇
  1998年   97篇
  1997年   97篇
  1996年   97篇
  1995年   72篇
  1994年   70篇
  1993年   61篇
  1992年   50篇
  1991年   25篇
  1990年   33篇
  1989年   35篇
  1988年   29篇
  1987年   23篇
  1986年   23篇
  1985年   14篇
  1984年   16篇
  1983年   7篇
  1982年   6篇
  1981年   10篇
  1980年   2篇
  1979年   3篇
  1978年   1篇
  1977年   3篇
  1975年   1篇
排序方式: 共有10000条查询结果,搜索用时 16 毫秒
41.
Abstract

This article proposes a new approach to analyze multiple vector autoregressive (VAR) models that render us a newly constructed matrix autoregressive (MtAR) model based on a matrix-variate normal distribution with two covariance matrices. The MtAR is a generalization of VAR models where the two covariance matrices allow the extension of MtAR to a structural MtAR analysis. The proposed MtAR can also incorporate different lag orders across VAR systems that provide more flexibility to the model. The estimation results from a simulation study and an empirical study on macroeconomic application show favorable performance of our proposed models and method.  相似文献   
42.
Abstract

One of the most important factors in building and changing communication mechanisms in social networks is considering features of the members of social networks. Most of the existing methods in network monitoring don’t consider effects of features in network formation mechanisms and others don’t lead to reliable results when the features abound or when there are correlations among them. In this article, we combined two methods principal component analysis (PCA) and likelihood method to monitor the underlying network model when the features of individuals abound and when some of them have high correlations with each other.  相似文献   
43.
现存的元代公案剧中,以包公的形象最为丰满。在多数剧本中,包公通常以高大全的形象出现;剧情多是借助鬼神、梦境的暗示判案。然而,《陈州粜米》的作者却独树一帜,塑造了一个具有多面性格的包公:他有着普通人的情感,面对官场黑暗会萌生退隐之意,但面对受到伤害的百姓又会挺身而出伸张正义;他幽默诙谐,与下属谈笑风生,又聪明机智,能在恶势力毫无意识的情况下轻松取证。包公形象的创新是作者独创性的体现,也是观众审美需求的产物。同时,剧本的设计也反映了当时的社会制度。这些创新使剧本更加贴近生活,剧情更加真实可信,具有极高的审美价值。  相似文献   
44.
Few longitudinal studies have examined the pathways through which family violence leads to dating aggression. In the current study the authors used 3 waves of data obtained from 8th‐ and 9th‐grade adolescents (N = 1,965) to examine the hypotheses that the prospective relationship between witnessing family violence and directly experiencing violence and physical dating aggression perpetration is mediated by 3 constructs: (a) normative beliefs about dating aggression (norms), (b) anger dysregulation, and (c) depression. Results from cross‐lagged regression models suggest that the relationship between having been hit by an adult and dating aggression is mediated by changes in norms and anger dysregulation, but not depression. No evidence of indirect effects from witnessing family violence to dating aggression was found through any of the proposed mediators. Taken together, the findings suggest that anger dysregulation and normative beliefs are potential targets for dating abuse prevention efforts aimed at youth who have directly experienced violence.  相似文献   
45.
Sociology of gender has developed beyond a personality-centered idea of “sex-roles” to an approach that stresses interaction and social structure. At the same time, there has been a concurrent development in the psychological sex-differences and medical literatures toward including the biological bases of sex-typed behavior and gender identities. In this paper, while we conceptualize gender as a social structure, we focus only on the individual level of analysis: testing the relative strength of (maternal circulating) prenatal hormones, childhood socialization, and the power of expectations attached to adult social roles (cultural interactionist) as explanations for women’s self-reported feminine and masculine selves. Our findings are complex, and support some importance of each theory. Prenatal hormones, childhood socialization, and cultural interactionism were all influential factors for gendered selves. While cultural expectations predicted only feminine selves, prenatal hormones were more robust predictors of masculine sense of self. While personality may be a relatively stable characteristic influenced by the body and childhood socialization, our results reinforce the importance of studying how the social world responds to and reinforces gendered personality.  相似文献   
46.
在沉积微相、储层物性特征分析的基础上,选取孔隙度、渗透率、流动带指数等参数,对泌阳凹陷赵凹油田泌301 井区核三段油层组进行流动单元划分。依据流动带指数的大小,将研究区目的层段划分为A、B、C、D 和E 等5 类流动单元。通过研究发现,各类流动单元与物性、岩性、沉积微相之间具有较好的对应关系,同时对不同流动单元产能进行了分析。研究结果表明,流动单元的划分能够真实客观地反映储层物性差、非均质性强的地质特点,单井产能与流动带指数有较好的乘幂关系,不同流动单元产能差异较为明显,物性最好的A 类流动单元产能最高,物性最差的E类流动单元产能最低。  相似文献   
47.
The U.S. electric power system is increasingly vulnerable to the adverse impacts of extreme climate events. Supply inadequacy risk can result from climate‐induced shifts in electricity demand and/or damaged physical assets due to hydro‐meteorological hazards and climate change. In this article, we focus on the risks associated with the unanticipated climate‐induced demand shifts and propose a data‐driven approach to identify risk factors that render the electricity sector vulnerable in the face of future climate variability and change. More specifically, we have leveraged advanced supervised learning theory to identify the key predictors of climate‐sensitive demand in the residential, commercial, and industrial sectors. Our analysis indicates that variations in mean dew point temperature is the common major risk factor across all the three sectors. We have also conducted a statistical sensitivity analysis to assess the variability in the projected demand as a function of the key climate risk factor. We then propose the use of scenario‐based heat maps as a tool to communicate the inadequacy risks to stakeholders and decisionmakers. While we use the state of Ohio as a case study, our proposed approach is equally applicable to all other states.  相似文献   
48.
Kun Xie  Kaan Ozbay  Hong Yang  Di Yang 《Risk analysis》2019,39(6):1342-1357
The widely used empirical Bayes (EB) and full Bayes (FB) methods for before–after safety assessment are sometimes limited because of the extensive data needs from additional reference sites. To address this issue, this study proposes a novel before–after safety evaluation methodology based on survival analysis and longitudinal data as an alternative to the EB/FB method. A Bayesian survival analysis (SARE) model with a random effect term to address the unobserved heterogeneity across sites is developed. The proposed survival analysis method is validated through a simulation study before its application. Subsequently, the SARE model is developed in a case study to evaluate the safety effectiveness of a recent red‐light‐running photo enforcement program in New Jersey. As demonstrated in the simulation and the case study, the survival analysis can provide valid estimates using only data from treated sites, and thus its results will not be affected by the selection of defective or insufficient reference sites. In addition, the proposed approach can take into account the censored data generated due to the transition from the before period to the after period, which has not been previously explored in the literature. Using individual crashes as units of analysis, survival analysis can incorporate longitudinal covariates such as the traffic volume and weather variation, and thus can explicitly account for the potential temporal heterogeneity.  相似文献   
49.
《Risk analysis》2018,38(8):1559-1575
Security of the systems is normally interdependent in such a way that security risks of one part affect other parts and threats spread through the vulnerable links in the network. So, the risks of the systems can be mitigated through investments in the security of interconnecting links. This article takes an innovative look at the problem of security investment of nodes on their vulnerable links in a given contagious network as a game‐theoretic model that can be applied to a variety of applications including information systems. In the proposed game model, each node computes its corresponding risk based on the value of its assets, vulnerabilities, and threats to determine the optimum level of security investments on its external links respecting its limited budget. Furthermore, direct and indirect nonlinear influences of a node's security investment on the risks of other nodes are considered. The existence and uniqueness of the game's Nash equilibrium in the proposed game are also proved. Further analysis of the model in a practical case revealed that taking advantage of the investment effects of other players, perfectly rational players (i.e., those who use the utility function of the proposed game model) make more cost‐effective decisions than selfish nonrational or semirational players.  相似文献   
50.
文章通过发放调查问卷,归纳、整理“十二五”期间的财务会计报表对河北省中等职业教育财政投入状况进行了分析,揭示了存在的主要问题,提出了改进中等职业教育财政投入机制的对策和建议。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号