首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   842篇
  免费   47篇
管理学   114篇
民族学   14篇
人口学   71篇
丛书文集   4篇
理论方法论   116篇
综合类   6篇
社会学   478篇
统计学   86篇
  2023年   8篇
  2022年   5篇
  2021年   4篇
  2020年   31篇
  2019年   31篇
  2018年   30篇
  2017年   47篇
  2016年   44篇
  2015年   22篇
  2014年   29篇
  2013年   153篇
  2012年   31篇
  2011年   30篇
  2010年   20篇
  2009年   11篇
  2008年   22篇
  2007年   21篇
  2006年   30篇
  2005年   23篇
  2004年   12篇
  2003年   16篇
  2002年   16篇
  2001年   15篇
  2000年   14篇
  1999年   18篇
  1998年   11篇
  1997年   8篇
  1996年   11篇
  1995年   5篇
  1994年   14篇
  1993年   9篇
  1992年   7篇
  1991年   5篇
  1990年   7篇
  1989年   8篇
  1987年   6篇
  1986年   6篇
  1985年   7篇
  1984年   5篇
  1983年   5篇
  1981年   6篇
  1980年   12篇
  1979年   7篇
  1978年   9篇
  1977年   8篇
  1976年   12篇
  1975年   7篇
  1974年   9篇
  1972年   3篇
  1971年   3篇
排序方式: 共有889条查询结果,搜索用时 637 毫秒
61.
This simulation study compares three operational measures of performance through the exploration of three work-in-process (WIP) inventory drive systems and their associated inventory buffer characteristics. The three drive systems under study are a push, a pull and a hybrid push-pull system. While these systems have many aspects in common, their buffer management systems do not. The data analysis was based on information gathered from three computer-simulated flow shop assembly lines all operating in the same environment. Hypotheses concerning the operational performance measurements were established, independent variables were controlled and manipulated and a conclusion was drawn as to which system would afford the operation optimum results. While inventory has traditionally been considered and is currently being shown as an asset from an accounting point of view, it is obvious from the findings of this study, that excess WIP inventory, above the minimal requirements for production, may have a negative effect on the operational measurements evaluated.  相似文献   
62.
Protecting riparian corridors is a commonly applied environmental policy in urban landscapes. However, empirical data demonstrating their efficacy for biodiversity conservation outcomes is scarce. In this study we investigated whether riparian corridor width influences the diversity and community structure of ant (Hymenoptera: Formicidae) and vascular plant assemblages therein. Eighteen corridors of differing widths were selected from within the Ku-ring-gai Local Government Area, Sydney Australia. Ants were sampled using pitfall traps positioned within rectangular vegetation transects (30 × 10 m). Both ant and plant species richness, when standardised for sampling effort, were unrelated to riparian corridor width. However, significant compositional differences between sites were evident with increased width up to ~50 m. Narrow corridors contained greater abundances of opportunistic ant species and higher proportions of exotic plants. We interpret this to be the result of the greater disturbance/edge influence derived from adjacent upland urban environments. Site beta diversity did not increase with corridor width, suggesting that the exclusion of novel upslope habitats in narrow riparian corridors is not a significant cause of community assemblage modification at these sites. To minimise the impact of deleterious edge effects on ant fauna, environmental managers should seek to retain riparian corridors wider than ~50 m. However, we observed substantial between-site variability of biotic assemblages, irrespective of corridor width. Therefore we recommend that environmental management practice needs to take a catchment-wide approach and consider other parameters that may contribute to riparian health so as to optimise the protection of riparian biodiversity.  相似文献   
63.
Formalized planning is currently applied to planning for operations and capital investment, planning for products and markets, and occasionally for manpower. However, there is little evidence that companies are producing formal plans and programmes to deal with social and political change. Unfortunately, public opinion is moving against business, action groups inside and outside companies are challenging the authority of management, and public officials and politicians are already framing new laws and regulations. Unless managers begin to get more involved in the framing of these controls they are likely to find laws enacted and enforced by people who have little knowledge or sympathy with business. In this article the author points up the necessity to assess the social and political challenge to their business, and formulate and implement social and political strategies and plans aimed at ensuring the survival and prosperity of their organisations.  相似文献   
64.
SUMMARY A novel proposal for combining forecast distributions is to use quantile regression to combine quantile estimates. We consider the usefulness of the resultant linear combining weights. If the quantile estimates are unbiased, then there is strong intuitive appeal for omitting the constant and constraining the weights to sum to unity in the quantile regression. However, we show that suppressing the constant renders one of the main attractive features of quantile regression invalid. We establish necessary and sufficient conditions for unbiasedness of a quantile estimate, and show that a combination with zero constant and weights that sum to unity is not necessarily unbiased.  相似文献   
65.
This article describes a 1-hour workshop designed to orient students to a career resource center and assist them with career decision making.  相似文献   
66.
Illicit computer intruders, or hackers, are often thought of as pathological individuals rather than as members of a community. However, hackers exist within social groups that provide expertise, support, training, journals and conferences. This article outlines this community to establish the nature of hacking within ‘information societies’. To delineate a ‘sociology of hackers’, an introduction is provided to the nature of computer–mediated communication and the act of computer intrusion, the hack. Following this the hacking community is explored in three sections. First, a profile of the number of hackers and hacks is provided by exploring available demographics. Second, an outline of its culture is provided through a discussion of six different aspects of the hacking community. The six aspects are technology, secrecy, anonymity, membership fluidity, male dominance and motivations. Third, an exploration of the community's construction of a boundary, albeit fluid, between itself and its other, the computer security industry, is provided. This boundary is constructed through metaphors whose central role is to establish the ethical nature of hacking. Finally, a conclusion that rejects any pathologisation of hackers is offered.  相似文献   
67.
An attempt is made to evaluate the effectiveness of a child guidance clinic. The outcome of the clinic's intervention was found to vary according to the nature of the presenting problem and the social class of the client. The categories of problems where treatment was ineffective are discussed in detail.  相似文献   
68.
69.
Objectives in many longitudinal studies of individuals infected with the human immunodeficiency virus (HIV) include the estimation of population average trajectories of HIV ribonucleic acid (RNA) over time and tests for differences in trajectory across subgroups. Special features that are often inherent in the underlying data include a tendency for some HIV RNA levels to be below an assay detection limit, and for individuals with high initial levels or high ranges of change to drop out of the study early because of illness or death. We develop a likelihood for the observed data that incorporates both of these features. Informative drop-outs are handled by means of an approach previously published by Schluchter. Using data from the HIV Epidemiology Research Study, we implement a maximum likelihood procedure to estimate initial HIV RNA levels and slopes within a population, compare these parameters across subgroups of HIV-infected women and illustrate the importance of appropriate treatment of left censoring and informative drop-outs. We also assess model assumptions and consider the prediction of random intercepts and slopes in this setting. The results suggest that marked bias in estimates of fixed effects, variance components and standard errors in the analysis of HIV RNA data might be avoided by the use of methods like those illustrated.  相似文献   
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号