首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12102篇
  免费   369篇
管理学   1629篇
民族学   60篇
人才学   2篇
人口学   1252篇
丛书文集   68篇
教育普及   1篇
理论方法论   1108篇
现状及发展   1篇
综合类   138篇
社会学   5956篇
统计学   2256篇
  2023年   88篇
  2021年   74篇
  2020年   201篇
  2019年   281篇
  2018年   312篇
  2017年   432篇
  2016年   352篇
  2015年   232篇
  2014年   305篇
  2013年   2113篇
  2012年   427篇
  2011年   366篇
  2010年   301篇
  2009年   269篇
  2008年   314篇
  2007年   308篇
  2006年   267篇
  2005年   283篇
  2004年   270篇
  2003年   245篇
  2002年   268篇
  2001年   303篇
  2000年   298篇
  1999年   279篇
  1998年   189篇
  1997年   173篇
  1996年   172篇
  1995年   166篇
  1994年   138篇
  1993年   149篇
  1992年   162篇
  1991年   140篇
  1990年   155篇
  1989年   177篇
  1988年   147篇
  1987年   132篇
  1986年   145篇
  1985年   165篇
  1984年   163篇
  1983年   155篇
  1982年   119篇
  1981年   101篇
  1980年   102篇
  1979年   134篇
  1978年   80篇
  1977年   84篇
  1976年   86篇
  1975年   76篇
  1974年   74篇
  1973年   69篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Damage models for natural hazards are used for decision making on reducing and transferring risk. The damage estimates from these models depend on many variables and their complex sometimes nonlinear relationships with the damage. In recent years, data‐driven modeling techniques have been used to capture those relationships. The available data to build such models are often limited. Therefore, in practice it is usually necessary to transfer models to a different context. In this article, we show that this implies the samples used to build the model are often not fully representative for the situation where they need to be applied on, which leads to a “sample selection bias.” In this article, we enhance data‐driven damage models by applying methods, not previously applied to damage modeling, to correct for this bias before the machine learning (ML) models are trained. We demonstrate this with case studies on flooding in Europe, and typhoon wind damage in the Philippines. Two sample selection bias correction methods from the ML literature are applied and one of these methods is also adjusted to our problem. These three methods are combined with stochastic generation of synthetic damage data. We demonstrate that for both case studies, the sample selection bias correction techniques reduce model errors, especially for the mean bias error this reduction can be larger than 30%. The novel combination with stochastic data generation seems to enhance these techniques. This shows that sample selection bias correction methods are beneficial for damage model transfer.  相似文献   
2.
In the current investigation, idiosyncratic deals (i-deals; individualized work arrangements) are modeled as differentiated resources that shape leader-member exchange (LMX) relationships in workgroups. We integrate literature on leader-member exchange (LMX) with research on i-deals to argue that employee evaluations of i-deals received from the grantor –typically the leader- enhance employee perceptions of LMX, which in turn become instrumental in generating positive performance outcomes. Furthermore, because workgroup characteristics have potential implications on the relationship between a deal grantor and the deal recipient, drawing upon social identity theory of leadership, we reason that the i-deals-LMX relationship is affected by the overall value congruence among the group members. Cross-level moderated mediation analyses on multi source data obtained from 289 employees nested in 60 workgroups showed that the mediational role of LMX in the i-deals to performance outcomes relationship was weaker in high value congruence groups.  相似文献   
3.
4.
5.
We employ two population‐level experiments to accurately measure opposition to immigration before and after the economic crisis of 2008. Our design explicitly addresses social desirability bias, which is the tendency to give responses that are seen favorably by others and can lead to substantial underreporting of opposition to immigration. We find that overt opposition to immigration, expressed as support for a closed border, increases slightly after the crisis. However, once we account for social desirability bias, no significant increase remains. We conclude that the observed increase in anti‐immigration sentiment in the post‐crisis United States is attributable to greater expression of opposition rather than any underlying change in attitudes.  相似文献   
6.
This qualitative study examines the narratives of seven heterosexual, cisgender individuals who identify both as persons of color and as positively disposed toward LGB and transgender-identified persons. Using psycho-discursive qualitative methodology, the authors will present the narrative strategies taken up by these positively disposed cisgender heterosexuals of color as they attempt to position themselves as supportive of LGB and transgender persons while negotiating the discourse of heteronormativity. The three narrative strategies have been titled differentiation, empathy, and coherence. In addition to mapping the three narrative strategies, the authors also explore why informants may choose certain strategies over others and argue that the intersection of social identities must be considered when attempting to understand social oppression. Implications for the human services fields will be discussed.  相似文献   
7.
Lifetime Data Analysis - Frailty models are generally used to model heterogeneity between the individuals. The distribution of the frailty variable is often assumed to be continuous. However, there...  相似文献   
8.
9.
A simple connected graph G with 2n vertices is said to be k-extendable for an integer k with \(0<k<n\) if G contains a perfect matching and every matching of cardinality k in G is a subset of some perfect matching. Lakhal and Litzler (Inf Process Lett 65(1):11–16, 1998) discovered a polynomial algorithm that decides whether a bipartite graph is k-extendable. For general graphs, however, it has been an open problem whether there exists a polynomial algorithm. The new result presented in this paper is that the extendability problem is co-NP-complete.  相似文献   
10.
Understanding the risk of biological invasions associated with particular transport pathways and source regions is critical for implementing effective biosecurity management. This may require both a model for physical connectedness between regions, and a measure of environmental similarity, so as to quantify the potential for a species to be transported from a given region and to survive at a destination region. We present an analysis of integrated biosecurity risk into Australia, based on flights and shipping data from each global geopolitical region, and an adaptation of the “range bagging” method to determine environmental matching between regions. Here, we describe global patterns of environmental matching and highlight those regions with many physical connections. We classify patterns of global invasion risk (high to low) into Australian states and territories. We validate our analysis by comparison with global presence data for 844 phytophagous insect pest species, and produce a list of high‐risk species not previously known to be present in Australia. We determined that, of the insect pest species used for validation, the species most likely to be present in Australia were those also present in geopolitical regions with high transport connectivity to Australia, and those regions that were geographically close, and had similar environments.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号