首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2675篇
  免费   115篇
管理学   313篇
民族学   25篇
人口学   289篇
丛书文集   15篇
理论方法论   322篇
综合类   32篇
社会学   1283篇
统计学   511篇
  2023年   27篇
  2022年   9篇
  2021年   31篇
  2020年   72篇
  2019年   100篇
  2018年   124篇
  2017年   157篇
  2016年   98篇
  2015年   74篇
  2014年   83篇
  2013年   541篇
  2012年   111篇
  2011年   107篇
  2010年   89篇
  2009年   65篇
  2008年   86篇
  2007年   86篇
  2006年   83篇
  2005年   73篇
  2004年   54篇
  2003年   60篇
  2002年   61篇
  2001年   60篇
  2000年   38篇
  1999年   47篇
  1998年   34篇
  1997年   29篇
  1996年   29篇
  1995年   24篇
  1994年   28篇
  1993年   28篇
  1992年   31篇
  1991年   30篇
  1990年   11篇
  1989年   13篇
  1988年   17篇
  1987年   16篇
  1986年   13篇
  1985年   21篇
  1984年   20篇
  1983年   17篇
  1982年   10篇
  1981年   17篇
  1980年   11篇
  1979年   9篇
  1978年   6篇
  1977年   4篇
  1976年   5篇
  1975年   8篇
  1974年   9篇
排序方式: 共有2790条查询结果,搜索用时 15 毫秒
41.
This paper revisits two bivariate Pareto models for fitting competing risks data. The first model is the Frank copula model, and the second one is a bivariate Pareto model introduced by Sankaran and Nair (1993 Sankaran, P. G., and N. U. Nair. 1993. A bivariate Pareto model and its applications to reliability. Naval Research Logistics 40 (7):10131020. doi:10.1002/1520-6750(199312)40:7%3c1013::AID-NAV3220400711%3e3.0.CO;2-7.[Crossref], [Web of Science ®] [Google Scholar]). We discuss the identifiability issues of these models and develop the maximum likelihood estimation procedures including their computational algorithms and model-diagnostic procedures. Simulations are conducted to examine the performance of the maximum likelihood estimation. Real data are analyzed for illustration.  相似文献   
42.
A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information‐based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions.  相似文献   
43.
Reducing the number of preterm births is a high public health priority in the U.S. Preterm birth, affecting an estimated 380,000 infants annually, is a leading cause of infant mortality and morbidity and is associated with individual and systemic characteristics. Preterm birth is estimated to cost society $26 billion annually. Despite an elevated financial burden caused by preterm birth, very little is known about who bears these costs. This study seeks to understand the relationship between Medicaid and private insurance payment for preterm birth, using multiple years of vital statistics data, which for the first time since 2010 include information on payment source. The nationwide data cover births that occur in all settings, including non-hospital settings, and many maternal characteristics not available in other datasets, improving upon previous analyses. These data can be used to promote better Medicaid coverage of interventions known to be effective in reducing preterm births.  相似文献   
44.
45.
Despite considerable research investigating the role of influence tactics on work-related outcomes in organizations, consensus on the effectiveness of influence tactics has been elusive. Specifically, there is a lack of integration concerning the relationships between proactive influence tactics and their outcomes. We investigate the effectiveness of 11 influence tactics from a comprehensive perspective using meta-analytic techniques. In particular, the current study focuses on relationships between each of the 11 influence tactics (i.e., rational persuasion, exchange, inspirational appeal, legitimating, apprising, pressure, collaboration, ingratiation, consultation, personal appeals, and coalition) and task- and relations-oriented outcomes. In addition, we investigate the moderating effects of the direction of influence tactics, measurement of influence tactics, singular influence tactic (versus use of a combination of influence tactics), independence of data sources, and study setting involved in the study. Regardless of task- and relations-oriented outcomes, based on 49 independent samples (N = 8987), our results show positive relationships between outcomes and rational persuasion, inspirational appeal, apprising, collaboration, ingratiation, consultation, and a negative relationship between pressure and outcomes. Rational persuasion is the only tactic which held stable positive relationships with both categories of outcomes regardless of moderating factors. Implications and directions for future research in the area of influence tactics are discussed.  相似文献   
46.
This study examines how the interplay among crisis involvement, brand image, and message appeal impacts the effectiveness of an apology in the context of a corporate crisis. To determine apology effectiveness, a 2 (crisis involvement: high vs. low) × 2 (brand image: symbolic vs. functional) × 2 (message appeal type: emotional vs. informational) experimental design was employed. The results demonstrate that the three-way interaction is significant, especially in the low-crisis involvement condition. The study concludes with a discussion of theoretical and practical implications and directions for future research.  相似文献   
47.
Most treatment for gambling disorder is provided on an outpatient basis. Only a small number of jurisdictions in North America provide higher levels of gambling treatment, such as residential or intensive outpatient (IOP) care, despite the potential need for these services. Further, there appear to be few guidelines for determining appropriate level of gambling treatment. The aim of the present study was to assess the appropriateness of higher levels of problem gambling care among clients receiving outpatient treatment. Problem gamblers and their therapists independently completed questionnaires that assessed the need and desire for residential and IOP treatment. About 42% of problem gambling outpatients noted that they would be “probably” or “definitely” willing to attend residential treatment, and about half indicated they would be equally likely to attend IOP. Therapists recommended about a third of their clients as appropriate for higher levels of care. For both client and therapist assessments, there was a significant association between desire or recommendation for level of treatment and severity of gambling and co-occurring problems. Further, therapist recommendations for level of care were significantly associated with client willingness to attend higher levels of treatment. Our data reveal the potential need for higher levels of care for problem gambling, as evaluated by clients and their therapists. Policy implications for the funding of residential and IOP treatment are discussed.  相似文献   
48.
Interactive Computer Based Instruction (CBI) systems involve teaching strategies to facilitate greater response opportunities during training in an effort to improve learner performance. The current study investigated the effect of online staff training videos with and without overt response requirements on posttest and maintenance test scores across six block-randomized instructional modules for four employees of a university located in the southeastern region of the United States. The overt response consisted of multiple-choice questions administered throughout select teaching modules using an alternating treatment design. Findings suggest that learning occurred as a result of the CBI training; however, the effectiveness of the overt response system varied across individuals, with no discernible differentiation between learning gains associated with response requirements. Other areas of research for expanding the efficacy of CBI and overt response systems are highlighted.  相似文献   
49.
ABSTRACT

Malaysia is one of the multi-ethnic, multi-cultural and multi-religious countries in Southeast Asia. Due to the pluralistic nature of Malaysia, it has a political structure based on ethnic politics. The ethnic preferential policies affected most domains of this country. The objective of this article is to examine the origin and background of ethnic politics in Malaysia. Findings of this study indicate that, ethnic politics originated during the British colonial period, it became a tool used by the Barisan Nasional for the legitimacy of regime. Moreover, ethnic politics in Malaysia today is intertwined with religion. Besides, there is the dilemma of the choice between the interest of certain ethnic group and national interests. However, with the opposition coalition Pakatan Harapan won the election in 9th May, UMNO-led BN lost power and interrupted its 61 years control, which leaves us an interesting topic to think about the future of Malaysian ethnic politics.  相似文献   
50.
In this article, to reduce computational load in performing Bayesian variable selection, we used a variant of reversible jump Markov chain Monte Carlo methods, and the Holmes and Held (HH) algorithm, to sample model index variables in logistic mixed models involving a large number of explanatory variables. Furthermore, we proposed a simple proposal distribution for model index variables, and used a simulation study and real example to compare the performance of the HH algorithm with our proposed and existing proposal distributions. The results show that the HH algorithm with our proposed proposal distribution is a computationally efficient and reliable selection method.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号