首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12108篇
  免费   357篇
管理学   1570篇
民族学   64篇
人才学   1篇
人口学   1292篇
丛书文集   62篇
教育普及   1篇
理论方法论   1121篇
现状及发展   1篇
综合类   149篇
社会学   5983篇
统计学   2221篇
  2023年   87篇
  2021年   61篇
  2020年   187篇
  2019年   254篇
  2018年   316篇
  2017年   421篇
  2016年   337篇
  2015年   226篇
  2014年   284篇
  2013年   2123篇
  2012年   426篇
  2011年   356篇
  2010年   287篇
  2009年   274篇
  2008年   319篇
  2007年   301篇
  2006年   281篇
  2005年   295篇
  2004年   275篇
  2003年   252篇
  2002年   271篇
  2001年   311篇
  2000年   298篇
  1999年   282篇
  1998年   191篇
  1997年   188篇
  1996年   174篇
  1995年   164篇
  1994年   139篇
  1993年   157篇
  1992年   166篇
  1991年   143篇
  1990年   159篇
  1989年   178篇
  1988年   148篇
  1987年   139篇
  1986年   151篇
  1985年   171篇
  1984年   166篇
  1983年   157篇
  1982年   116篇
  1981年   104篇
  1980年   103篇
  1979年   138篇
  1978年   79篇
  1977年   85篇
  1976年   85篇
  1975年   76篇
  1974年   74篇
  1973年   70篇
排序方式: 共有10000条查询结果,搜索用时 309 毫秒
1.
Damage models for natural hazards are used for decision making on reducing and transferring risk. The damage estimates from these models depend on many variables and their complex sometimes nonlinear relationships with the damage. In recent years, data‐driven modeling techniques have been used to capture those relationships. The available data to build such models are often limited. Therefore, in practice it is usually necessary to transfer models to a different context. In this article, we show that this implies the samples used to build the model are often not fully representative for the situation where they need to be applied on, which leads to a “sample selection bias.” In this article, we enhance data‐driven damage models by applying methods, not previously applied to damage modeling, to correct for this bias before the machine learning (ML) models are trained. We demonstrate this with case studies on flooding in Europe, and typhoon wind damage in the Philippines. Two sample selection bias correction methods from the ML literature are applied and one of these methods is also adjusted to our problem. These three methods are combined with stochastic generation of synthetic damage data. We demonstrate that for both case studies, the sample selection bias correction techniques reduce model errors, especially for the mean bias error this reduction can be larger than 30%. The novel combination with stochastic data generation seems to enhance these techniques. This shows that sample selection bias correction methods are beneficial for damage model transfer.  相似文献   
2.
In the current investigation, idiosyncratic deals (i-deals; individualized work arrangements) are modeled as differentiated resources that shape leader-member exchange (LMX) relationships in workgroups. We integrate literature on leader-member exchange (LMX) with research on i-deals to argue that employee evaluations of i-deals received from the grantor –typically the leader- enhance employee perceptions of LMX, which in turn become instrumental in generating positive performance outcomes. Furthermore, because workgroup characteristics have potential implications on the relationship between a deal grantor and the deal recipient, drawing upon social identity theory of leadership, we reason that the i-deals-LMX relationship is affected by the overall value congruence among the group members. Cross-level moderated mediation analyses on multi source data obtained from 289 employees nested in 60 workgroups showed that the mediational role of LMX in the i-deals to performance outcomes relationship was weaker in high value congruence groups.  相似文献   
3.
4.
5.
We employ two population‐level experiments to accurately measure opposition to immigration before and after the economic crisis of 2008. Our design explicitly addresses social desirability bias, which is the tendency to give responses that are seen favorably by others and can lead to substantial underreporting of opposition to immigration. We find that overt opposition to immigration, expressed as support for a closed border, increases slightly after the crisis. However, once we account for social desirability bias, no significant increase remains. We conclude that the observed increase in anti‐immigration sentiment in the post‐crisis United States is attributable to greater expression of opposition rather than any underlying change in attitudes.  相似文献   
6.
This qualitative study examines the narratives of seven heterosexual, cisgender individuals who identify both as persons of color and as positively disposed toward LGB and transgender-identified persons. Using psycho-discursive qualitative methodology, the authors will present the narrative strategies taken up by these positively disposed cisgender heterosexuals of color as they attempt to position themselves as supportive of LGB and transgender persons while negotiating the discourse of heteronormativity. The three narrative strategies have been titled differentiation, empathy, and coherence. In addition to mapping the three narrative strategies, the authors also explore why informants may choose certain strategies over others and argue that the intersection of social identities must be considered when attempting to understand social oppression. Implications for the human services fields will be discussed.  相似文献   
7.
Lifetime Data Analysis - Frailty models are generally used to model heterogeneity between the individuals. The distribution of the frailty variable is often assumed to be continuous. However, there...  相似文献   
8.
9.
A simple connected graph G with 2n vertices is said to be k-extendable for an integer k with \(0<k<n\) if G contains a perfect matching and every matching of cardinality k in G is a subset of some perfect matching. Lakhal and Litzler (Inf Process Lett 65(1):11–16, 1998) discovered a polynomial algorithm that decides whether a bipartite graph is k-extendable. For general graphs, however, it has been an open problem whether there exists a polynomial algorithm. The new result presented in this paper is that the extendability problem is co-NP-complete.  相似文献   
10.
Understanding the risk of biological invasions associated with particular transport pathways and source regions is critical for implementing effective biosecurity management. This may require both a model for physical connectedness between regions, and a measure of environmental similarity, so as to quantify the potential for a species to be transported from a given region and to survive at a destination region. We present an analysis of integrated biosecurity risk into Australia, based on flights and shipping data from each global geopolitical region, and an adaptation of the “range bagging” method to determine environmental matching between regions. Here, we describe global patterns of environmental matching and highlight those regions with many physical connections. We classify patterns of global invasion risk (high to low) into Australian states and territories. We validate our analysis by comparison with global presence data for 844 phytophagous insect pest species, and produce a list of high‐risk species not previously known to be present in Australia. We determined that, of the insect pest species used for validation, the species most likely to be present in Australia were those also present in geopolitical regions with high transport connectivity to Australia, and those regions that were geographically close, and had similar environments.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号