首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10986篇
  免费   276篇
管理学   1474篇
民族学   51篇
人才学   1篇
人口学   1172篇
丛书文集   60篇
教育普及   1篇
理论方法论   955篇
现状及发展   1篇
综合类   134篇
社会学   5262篇
统计学   2151篇
  2023年   75篇
  2020年   162篇
  2019年   220篇
  2018年   259篇
  2017年   354篇
  2016年   282篇
  2015年   180篇
  2014年   238篇
  2013年   1926篇
  2012年   380篇
  2011年   310篇
  2010年   257篇
  2009年   245篇
  2008年   274篇
  2007年   269篇
  2006年   243篇
  2005年   254篇
  2004年   240篇
  2003年   214篇
  2002年   243篇
  2001年   281篇
  2000年   284篇
  1999年   266篇
  1998年   180篇
  1997年   165篇
  1996年   160篇
  1995年   153篇
  1994年   125篇
  1993年   146篇
  1992年   155篇
  1991年   137篇
  1990年   150篇
  1989年   174篇
  1988年   142篇
  1987年   131篇
  1986年   143篇
  1985年   164篇
  1984年   160篇
  1983年   151篇
  1982年   113篇
  1981年   100篇
  1980年   99篇
  1979年   133篇
  1978年   78篇
  1977年   82篇
  1976年   83篇
  1975年   75篇
  1974年   74篇
  1973年   69篇
  1966年   55篇
排序方式: 共有10000条查询结果,搜索用时 355 毫秒
1.
Damage models for natural hazards are used for decision making on reducing and transferring risk. The damage estimates from these models depend on many variables and their complex sometimes nonlinear relationships with the damage. In recent years, data‐driven modeling techniques have been used to capture those relationships. The available data to build such models are often limited. Therefore, in practice it is usually necessary to transfer models to a different context. In this article, we show that this implies the samples used to build the model are often not fully representative for the situation where they need to be applied on, which leads to a “sample selection bias.” In this article, we enhance data‐driven damage models by applying methods, not previously applied to damage modeling, to correct for this bias before the machine learning (ML) models are trained. We demonstrate this with case studies on flooding in Europe, and typhoon wind damage in the Philippines. Two sample selection bias correction methods from the ML literature are applied and one of these methods is also adjusted to our problem. These three methods are combined with stochastic generation of synthetic damage data. We demonstrate that for both case studies, the sample selection bias correction techniques reduce model errors, especially for the mean bias error this reduction can be larger than 30%. The novel combination with stochastic data generation seems to enhance these techniques. This shows that sample selection bias correction methods are beneficial for damage model transfer.  相似文献   
2.
In the current investigation, idiosyncratic deals (i-deals; individualized work arrangements) are modeled as differentiated resources that shape leader-member exchange (LMX) relationships in workgroups. We integrate literature on leader-member exchange (LMX) with research on i-deals to argue that employee evaluations of i-deals received from the grantor –typically the leader- enhance employee perceptions of LMX, which in turn become instrumental in generating positive performance outcomes. Furthermore, because workgroup characteristics have potential implications on the relationship between a deal grantor and the deal recipient, drawing upon social identity theory of leadership, we reason that the i-deals-LMX relationship is affected by the overall value congruence among the group members. Cross-level moderated mediation analyses on multi source data obtained from 289 employees nested in 60 workgroups showed that the mediational role of LMX in the i-deals to performance outcomes relationship was weaker in high value congruence groups.  相似文献   
3.
4.
5.
We employ two population‐level experiments to accurately measure opposition to immigration before and after the economic crisis of 2008. Our design explicitly addresses social desirability bias, which is the tendency to give responses that are seen favorably by others and can lead to substantial underreporting of opposition to immigration. We find that overt opposition to immigration, expressed as support for a closed border, increases slightly after the crisis. However, once we account for social desirability bias, no significant increase remains. We conclude that the observed increase in anti‐immigration sentiment in the post‐crisis United States is attributable to greater expression of opposition rather than any underlying change in attitudes.  相似文献   
6.
This qualitative study examines the narratives of seven heterosexual, cisgender individuals who identify both as persons of color and as positively disposed toward LGB and transgender-identified persons. Using psycho-discursive qualitative methodology, the authors will present the narrative strategies taken up by these positively disposed cisgender heterosexuals of color as they attempt to position themselves as supportive of LGB and transgender persons while negotiating the discourse of heteronormativity. The three narrative strategies have been titled differentiation, empathy, and coherence. In addition to mapping the three narrative strategies, the authors also explore why informants may choose certain strategies over others and argue that the intersection of social identities must be considered when attempting to understand social oppression. Implications for the human services fields will be discussed.  相似文献   
7.
Lifetime Data Analysis - Frailty models are generally used to model heterogeneity between the individuals. The distribution of the frailty variable is often assumed to be continuous. However, there...  相似文献   
8.
9.
A simple connected graph G with 2n vertices is said to be k-extendable for an integer k with \(0<k<n\) if G contains a perfect matching and every matching of cardinality k in G is a subset of some perfect matching. Lakhal and Litzler (Inf Process Lett 65(1):11–16, 1998) discovered a polynomial algorithm that decides whether a bipartite graph is k-extendable. For general graphs, however, it has been an open problem whether there exists a polynomial algorithm. The new result presented in this paper is that the extendability problem is co-NP-complete.  相似文献   
10.
Understanding the risk of biological invasions associated with particular transport pathways and source regions is critical for implementing effective biosecurity management. This may require both a model for physical connectedness between regions, and a measure of environmental similarity, so as to quantify the potential for a species to be transported from a given region and to survive at a destination region. We present an analysis of integrated biosecurity risk into Australia, based on flights and shipping data from each global geopolitical region, and an adaptation of the “range bagging” method to determine environmental matching between regions. Here, we describe global patterns of environmental matching and highlight those regions with many physical connections. We classify patterns of global invasion risk (high to low) into Australian states and territories. We validate our analysis by comparison with global presence data for 844 phytophagous insect pest species, and produce a list of high‐risk species not previously known to be present in Australia. We determined that, of the insect pest species used for validation, the species most likely to be present in Australia were those also present in geopolitical regions with high transport connectivity to Australia, and those regions that were geographically close, and had similar environments.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号