首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2113篇
  免费   131篇
  国内免费   14篇
管理学   173篇
民族学   34篇
人口学   20篇
丛书文集   199篇
理论方法论   59篇
综合类   1421篇
社会学   74篇
统计学   278篇
  2024年   2篇
  2023年   12篇
  2022年   22篇
  2021年   20篇
  2020年   40篇
  2019年   41篇
  2018年   49篇
  2017年   42篇
  2016年   42篇
  2015年   59篇
  2014年   102篇
  2013年   218篇
  2012年   168篇
  2011年   134篇
  2010年   117篇
  2009年   89篇
  2008年   119篇
  2007年   146篇
  2006年   124篇
  2005年   119篇
  2004年   119篇
  2003年   108篇
  2002年   76篇
  2001年   56篇
  2000年   58篇
  1999年   22篇
  1998年   15篇
  1997年   20篇
  1996年   16篇
  1995年   15篇
  1994年   15篇
  1993年   12篇
  1992年   8篇
  1991年   8篇
  1990年   4篇
  1989年   7篇
  1988年   6篇
  1987年   10篇
  1986年   1篇
  1985年   3篇
  1984年   7篇
  1983年   2篇
  1982年   2篇
  1981年   2篇
  1978年   1篇
排序方式: 共有2258条查询结果,搜索用时 15 毫秒
1.
根据支撑基础、责任负担、保障水平以及民众需求等维度,可以把民生保障划分为托底型、基本型、改善型以及富裕型等四种类型。改善型民生是经济社会发展到一定阶段的产物,也是国家治理体系与治理能力现代化的客观要求。它是指通过各类民生项目的安排及民生待遇优化以促进民众生活得到持续改善、社会发展水平得到提升的一种制度类型,是民生项目更加齐全、内容更为完善、治理水平更高、使民众各按其分的民生模式,是人们的日常生活与服务消费支出总额持续增长以便能够提升生活水平的民生类型,是那种不断满足人的需要特别是较高层次需要的模式类型,也是更有助于形成社会结构稳定、国家长治久安的民生制度类型,因而具有综合性、完善性、激励性以及发展性等特点。这要求我们优化民生类型设计及民生投入结构,补齐改善型民生短板,营造良好社会秩序,扎实推进国家治理体系及治理能力现代化建设。  相似文献   
2.
《Risk analysis》2018,38(10):2193-2207
Social diffusion of information amplifies risk through processes of birth, death, and distortion of message content. Dread risk—involving uncontrollable, fatal, involuntary, and catastrophic outcomes (e.g., terrorist attacks and nuclear accidents)—may be particularly susceptible to amplification because of the psychological biases inherent in dread risk avoidance. To test this, initially balanced information about high or low dread topics was given to a set of individuals who then communicated this information through diffusion chains, each person passing a message to the next. A subset of these chains were also reexposed to the original information. We measured prior knowledge, perceived risk before and after transmission, and, at each link, number of positive and negative statements. Results showed that the more a message was transmitted the more negative statements it contained. This was highest for the high dread topic. Increased perceived risk and production of negative messages was closely related to the amount of negative information that was received, with domain knowledge mitigating this effect. Reexposure to the initial information was ineffectual in reducing bias, demonstrating the enhanced danger of socially transmitted information.  相似文献   
3.
This paper proposes a probabilistic frontier regression model for binary type output data in a production process setup. We consider one of the two categories of outputs as ‘selected’ category and the reduction in probability of falling in this category is attributed to the reduction in technical efficiency (TE) of the decision-making unit. An efficiency measure is proposed to determine the deviations of individual units from the probabilistic frontier. Simulation results show that the average estimated TE component is close to its true value. An application of the proposed method to the data related to the Indian public sector banking system is provided where the output variable is the indicator of level of non-performing assets. Individual TE is obtained for each of the banks under consideration. Among the public sector banks, Andhra bank is found to be the most efficient, whereas the United Bank of India is the least.  相似文献   
4.
In this paper, we establish the strong law of large numbers and complete convergence for non-identically distributed WOD random variables. We derive some new inequalities of Fuk–Nagaev type for the sums of non-identically distributed WD random variables. All these results further extend and refine previous ones.  相似文献   
5.
In interviews with members of Britain’s Civil Defence Services, experiences of Cold War voluntarism are recalled in different ways. Some remembered their desire to help defend their nation and local community. Others remembered making a leisure choice that had little connection to the potential nuclear war the organization was ostensibly preparing for. No one provided a well-developed account of civil defence’s ability to provide a defence against the effects of a nuclear war. Popular memory theorists suggest cultural discourse limits the ability of individuals to narrate stories that do not align with culturally valued frameworks: in this case, dominant understandings of civil defence as at best ridiculous or at worst dangerous were established in the 1980s. This article argues that memories of civil defence voluntarism in the 1950-60s have been shaped by these discourses, but that individuals were able to express the different meanings civil defence had in their lives in ways that provide a more nuanced and holistic picture of the intersections of leisure, service and sociability that made up civil defence. As such, it argues that oral history allows us to understand the various ‘horizons of possibility’ that made up individual experiences of the Cold War.  相似文献   
6.
国际政治的参与情境决定行动者的博弈行为类型,参与情境变迁将导致行动者行为发生变化。能源安全是国家对外政策的核心议题之一。1973年爆发的第一次石油危机,凸显了能源安全问题的重要性,改变了二战后国际能源政治的参与情境,构建了行动者新的博弈类型,调整了国际能源政治行动者的博弈策略。为了有效应对国际能源政治的情境变迁,美国通过协调与其他国家的能源关系,设置能源安全国际议程,最终确定了新的国际能源秩序。当前,我国在积极参与国际能源合作的过程中,第一次石油危机后国际能源政治的情境变迁以及国际社会的应对策略具有十分重要的启示意义。  相似文献   
7.
Despite the evidence of effectiveness of positive parenting programs, little is known about the typology of changes that parents at psychosocial risk undergo after an intervention. We compared individual patterns of change in three parenting outcomes in 256 at risk parents with young children attending the group‐based Growing Up Happily in the Family program delivered in municipal social services. We identified four clusters of individual change: Cluster 1 (30.6%) had negative changes in parental child‐rearing attitudes and parenting stress, Cluster 2 (27.7%) had positive changes in child‐rearing attitudes and negative results in parental perceived competence, and Cluster 3 (24.1%) and Cluster 4 (17.6%) showed overall better results. Residential area, type of social support, and quality of implementation characterized cluster membership. Participants in clusters with better results were more satisfied with the program than those with worse results. Practical recommendations are provided for the successful implementation of group parenting programs in family preservation services.  相似文献   
8.
During a new drug development process, it is desirable to timely detect potential safety signals. For this purpose, repeated meta‐analyses may be performed sequentially on accumulating safety data. Moreover, if the amount of safety data from the originally planned program is not enough to ensure adequate power to test a specific hypothesis (e.g., the noninferiority hypothesis of an event of interest), the total sample size may be increased by adding new studies to the program. Without appropriate adjustment, it is well known that the type I error rate will be inflated because of repeated analyses and sample size adjustment. In this paper, we discuss potential issues associated with adaptive and repeated cumulative meta‐analyses of safety data conducted during a drug development process. We consider both frequentist and Bayesian approaches. A new drug development example is used to demonstrate the application of the methods. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
9.
In this article, a classification model based on the majority rule sorting (MR‐Sort) method is employed to evaluate the vulnerability of safety‐critical systems with respect to malevolent intentional acts. The model is built on the basis of a (limited‐size) set of data representing (a priori known) vulnerability classification examples. The empirical construction of the classification model introduces a source of uncertainty into the vulnerability analysis process: a quantitative assessment of the performance of the classification model (in terms of accuracy and confidence in the assignments) is thus in order. Three different app oaches are here considered to this aim: (i) a model–retrieval‐based approach, (ii) the bootstrap method, and (iii) the leave‐one‐out cross‐validation technique. The analyses are presented with reference to an exemplificative case study involving the vulnerability assessment of nuclear power plants.  相似文献   
10.
虽然以往研究海洋霸权与大陆均势关系的成果颇丰,但还是存在一些不足。为此,本文对海洋霸权与大陆均势关系的结构类型、运行机制及其影响等进行了深化与细化。在海洋霸权国国力大于或小于或等于大陆均势中的有关国家的不同情况下,大陆均势可以分为不需要海洋霸权仅凭大陆国家就能形成的大陆均势和需要海洋霸权且支持其中一方才能形成的大陆均势。不同的国力对比和均势构成情况,对海洋霸权与大陆国家的政治安全与经济发展所产生的影响是不同的。经过分析和比较,本文得出结论:海陆分界难分优劣,关系互补战略呼应,这就是美英极力推行海洋霸权与大陆均势战略的现实诠释。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号