首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16篇
  免费   0篇
丛书文集   2篇
综合类   3篇
社会学   9篇
统计学   2篇
  2012年   2篇
  2010年   1篇
  2004年   1篇
  1995年   1篇
  1985年   1篇
  1984年   2篇
  1983年   3篇
  1982年   1篇
  1981年   2篇
  1980年   1篇
  1976年   1篇
排序方式: 共有16条查询结果,搜索用时 29 毫秒
1.
Many government agencies have "constituents" who believe the agencies should hear and consider their needs and desires in establishing program priorities. This article describes how one involves interested constituents (consumers, industry, medical professionals, and state organizations) in the agency's annual priority-setting process. This participation has produced a number of beneficial results-some expected and some unexpected.  相似文献   
2.
当今的世界是网络的世界,数以万计的人们通过互联网来传递信息,实现办公。因此,如何保证网络的安全成为人们日益关注的问题。IPSec就是在IPV4数据包结构上增加的一种网络安全性服务,使网络实现了安全通讯。  相似文献   
3.
八年制医学博士教育是我国医学教育国际化进程的重要改革举措,与世界发达国家如美国成功的八年制医学博士教育相比,我国的八年制医学教育发展规模较小,发展历程短,许多方面还有待完善和改进。应当借鉴发达国家医学高等教育的发展经验,全面调研我国八年制教育现况,完善我国八年制培养模式;及时调整不合理的培养模式;实施定期评估政策,有效保证我国八年制教育的质量。  相似文献   
4.
This article provides an overview of the implementation and evaluation of Family Support Centers (FSC) in the U.S. Air Force. After describing the FSC model, the quantitative aspect of the evaluation is discussed, including the evaluation design, implementation methods, survey response rates, and procedures for data analysis. A summary of evaluation results also are presented as well as a discussion of administrative and methodological issues encountered in performing the evaluation. The results of the evaluation suggest that the FSC has become an integral part of the base human service delivery system, especially for married members and civilian spouses.  相似文献   
5.
6.
Social networking sites (SNSs) make it possible to connect people and they can communicate with others. Due to the lack of privacy mechanisms, the users in SNSs are vulnerable to some kinds of attacks. Security and privacy issues have become critically important with the fast expansion of SNSs. Most network applications such as pervasive computing, grid computing and P2P networks can be viewed as multi-agent systems which are open, anonymous and dynamic in nature. Moreover, most of the existing reputation trust models (RTMs) do not depend on any clustering structures. The clustering structures are used to effectively calculate the trustworthiness of the network nodes. In this paper, a novel cosine similarity-based clustering and dynamic reputation trust aware key generation (CSBC-DRT) scheme is proposed. For better faced clustering, a cosine similarity measure is estimated for all the nodes on the network. Based on the similarity measure among the nodes, the network nodes are clustered into disjoint groups. The RTM is built in this proposed scheme. Here, an improved MD5 algorithm is explored for key generation and key verification. After the key verification, the trusted measures such as reputation value, positive edge and negative edge values are computed to formulate the trusted network. The proposed scheme performs better than the existing RTM, which provides trusted communication in social networks.  相似文献   
7.
All hospital care can be characterized as either appropriate (i.e., efficatious and necessary) or inappropriate (i.e., services without benefit or services that could be provided in a less costly setting). A demonstration project combining an appropriateness determination methodology with a cybernetic control system was implemented in a study area that included six hospitals and approximately 400 practicing physicians. Project results to date indicate substantial improvements in the ratio of appropriate to inappropriate care for both hospitals and individual physicians. Evaluation research design problems and areas of future research are also discussed.  相似文献   
8.
A generalized adult hostility toward youth derives from the complexities of the parent/child relationship, often mirrored in the helper/client and therapist/patient dyads. Parents derive considerable or little narcissistic gain from the accomplishments of their offspring, and conversely, are disappointed or even mortified by their failures. This is particularly true of narcissistically vulnerable parents—helpers and therapists as well—and accounts for widespread attitudes of competition, disparagement, and outright hostility toward young people. In the extreme, the pathological situations of emotional exploitation, incest, and physical abuse occur, but lesser forms of exploitation, such as personally gratifying advocacy, political gain, cultism, and enhancement of professional status, point to similar, but seemingly less destructive, forms of narcissistic gain. Youth may respond by conforming, defying, disappointing, and deviating. Adults may be either pleased, or enraged.  相似文献   
9.
某鸡场MD免疫鸡群65~85日龄鸡大量发病、死亡,用多种约物治疗无效,通过流行病学、症状、病理剖检和细菌学、血清学(琼脂扩散)试验诊断为鸡马立克氏病。  相似文献   
10.
The present study evaluated the effectiveness of a two-week therapeutic day camping experience in facilitating change in children aged 8–12 years with adjustment or behavioral problems. For each of the 42 children attending camp, three Goal Attainment Scales (GAS) were administered before camp separately to the children, parents and counselors. These scales specified individualized behavioral goals for problem areas relating to self, family, children, and group which could be realistically attainable within two weeks. Post-camp GAS follow-up showed that children, parent, and counselor groups each perceived the children as achieving significant positive change in regard to specified goals. Children were also administered a locus of control measure. The hypothesis that “internals” would be perceived as achieving significantly more positive behavioral change on the GAS than “externals” was confirmed. Discussion centered on the viability of therapeutic camping, the merits of using the GAS and the multi-informant approach, and specific therapeutic strategies indicated by the present findings.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号