首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   168篇
  免费   2篇
管理学   24篇
民族学   4篇
人口学   24篇
理论方法论   7篇
综合类   1篇
社会学   28篇
统计学   82篇
  2022年   1篇
  2021年   1篇
  2020年   8篇
  2019年   11篇
  2018年   4篇
  2017年   8篇
  2016年   5篇
  2015年   10篇
  2014年   5篇
  2013年   42篇
  2012年   4篇
  2011年   3篇
  2010年   4篇
  2009年   8篇
  2008年   4篇
  2007年   6篇
  2006年   5篇
  2005年   2篇
  2004年   2篇
  2003年   3篇
  2002年   2篇
  2001年   1篇
  2000年   3篇
  1999年   1篇
  1998年   1篇
  1996年   1篇
  1993年   2篇
  1992年   2篇
  1991年   1篇
  1990年   2篇
  1989年   1篇
  1988年   2篇
  1987年   2篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1981年   1篇
  1978年   2篇
  1975年   1篇
  1973年   3篇
  1972年   1篇
  1971年   1篇
  1968年   1篇
排序方式: 共有170条查询结果,搜索用时 31 毫秒
21.
The problem of finding D-optimal designs in the presence of a number of covariates has been considered in the one-way set-up. This is an extension of Dey and Mukerjee (2006 Dey , A. , Mukerjee , R. ( 2006 ). D-optimal designs for covariate models . Statistics 40 : 297305 .[Taylor &; Francis Online], [Web of Science ®] [Google Scholar]) in the sense that for fixed replication numbers of each treatment, an alternative upper bound to the determinant of the information matrix has been found through completely symmetric C-matrices for the regression coefficients; this upper bound includes the upper bound given in Dey and Mukerjee (2006 Dey , A. , Mukerjee , R. ( 2006 ). D-optimal designs for covariate models . Statistics 40 : 297305 .[Taylor &; Francis Online], [Web of Science ®] [Google Scholar]) obtained through diagonal C-matrices. Because of the fact that a smaller class of C-matrices was used at the intermediate stage where the replication numbers were fixed, ultimately some optimal designs remained unidentified there. These designs have been identified here and thereby the conjecture made in Dey and Mukerjee (2006 Dey , A. , Mukerjee , R. ( 2006 ). D-optimal designs for covariate models . Statistics 40 : 297305 .[Taylor &; Francis Online], [Web of Science ®] [Google Scholar]) has been settled.  相似文献   
22.
Risks in offshore IT outsourcing: A service provider perspective   总被引:4,自引:0,他引:4  
Offshore outsourcing of Information Technology (IT) services is the prevalent practice in global businesses today. Despite the strategic advantages and cost benefits that offshore outsourcing offers, outsourcing relationships also involve risks, for both the client, as well as the service provider – a fact that is evidenced by the reported failures of such engagements. Some of the prior researches in this area have focused on identifying various types of client risks and their sources. However, the study of risks from a service provider’s perspective has not received due treatment in literature. This study analyses offshore IT outsourcing risks from the perspective of service providers. A case based approach using the principles of grounded theory was used for studying the risks. Theoretical sampling was used to collect data from 5 mid-tier offshore third party service providers based in Bangalore, India. From our coding and analysis three broad categories of service provider risks emerged, namely, macroeconomic, relationship specific and project specific. Relationship maturity, nature of contract, nature of service or project and nature of client were identified as contextual factors which influence the degree of risk.  相似文献   
23.
The purpose of the present work is to extend the work of Gupta et al. (2010) to s  -level column balanced supersaturated designs. Addition of runs to an existing E(χ2)-optimalE(χ2)-optimal supersaturated design and to study the optimality of the resulting design is an important issue. This paper considers the study of the optimality of the resulting design. A lower bound to E(χ2)E(χ2) has been obtained for the extended supersaturated designs. Some examples and a small catalogue of E(χ2)-optimalE(χ2)-optimal supersaturated designs are also presented.  相似文献   
24.
In the South Asian community in the United States, domestic violence is a prevalent problem of significant magnitude. Although the community stridently denies the existence of this horror, women have been systematically organizing antiviolenceagainst- women work for the last 15 yearsAt this time, it is a vibrant movement struggling with several complex issues that are perhaps less common in thedominant white community. As in the lives of immigrant women of color, much of the intricacies of domestic violencein the South Asian context emerge from the intersections of race, class, andsresidencystatus problems. Consequently, a slew of personal, institutional, and cultural barriers commingle to form roadblocks for battered South Asian women, who attempt to escape family violence. As the needs of battered South Asian first and second generation women enlarge and become more perceptible, the community-based organizations have to ready themselves for more complicated activities in the future.  相似文献   
25.
Runa Das 《Social Identities》2013,19(6):717-740
Through a comparative study of India and Pakistan's national security discourses, this article explores the linkages between post-colonial India and Pakistan's nationalist/communalist identities, configurations of masculinities, and gendered representations underpinning their nuclear (in)securities. This paper contends that the colonial politics of place-making in the sub-continent has not only inscribed a process of ‘othering’ between these states but has also facilitated the rise of divergent visions of post-colonial nationalisms, which, at each of their phases and with particular configurations of masculinities, have used women's bodies to re-map India-Pakistan's borders and national (in)securities. This article particularly draws attention to a new form of gendered manipulation in South Asian politics in the late 1990s, whereby both states, embedded in colonial notions of religious/cultural masculinities, have relied on discourses of Hindu/Indian and Muslim/Pakistani women's violence and protection from the ‘other’ to pursue aggressive policies of nuclearization. It is at this conjectural moment of a Hinduicized and Islamicized nationalism (flamed by the contestations of a Hindu versus an Islamic masculinity) that one needs to provide a feminist re-interpretation of India-Pakistan's nationalist identities, gendered imaginaries, and their re-articulation of national (in)securities – that represents a religious/gendered ‘otherness’ in South Asia's nuclear policies.  相似文献   
26.
This study addresses issues related to inequality formation and reproduction, especially in regard to gender dynamics operating in a non-western society. Grounded in a post-colonial understanding of urban educated upper and middle class women NGO volunteers in contemporary India, it analyzes how they negotiate new approaches to challenge existing traditional gender roles, yet in critical ways contribute to their reproduction, particularly the traditional concept of ideal Indian womanhood. Employing structural ritualization theory we examine how ritualized symbolic practices related to the traditional concepts of caretaking, sacrifice, and the concept of natural sexual differences continue to be emphasized in a generation confronted with conflicting expectations about modern women’s roles. Twenty-one testimonies provide the major source of evidence along with data gathered through participant observation. This research enhances our understanding of the power of rituals and how they can continue to shape the cognitions and activities of actors.
Aditi MitraEmail:
  相似文献   
27.
"Four general methods of decomposing the difference between two rates into several components are provided. For data cross-classified by several factors, all four methods can be used treating the factors either hierarchically or symmetrically, and within each treatment, the methods are expected to give very similar results. Since the results may differ significantly depending on whether the factors are hierarchical or symmetrical and since there is no objective way of arranging the factors hierarchically, symmetrical treatment of the factors is recommended. The latter approach is used to study race-sex inequalities in mean annual earnings for year-round full-time workers in the United States based on the 1980 census data cross-classified by education, age, and occupation." (SUMMARY IN FRE)  相似文献   
28.
In her work on the components of a difference between two rates, Kitagawa (1955) was successful in dividing the difference into the rate effect and the effect of the factor, for data classified by one factor. Her formulation for data classified by two factors, however, involves an interaction term which is difficult to interpret. Retherford and Cho (1973) devised a method that does not include any interaction terms. However, their method has other limitations, such as the dependence of the results on the order in which the effects of the factors are computed. In this paper, we provide a general method capable of handling any number of factors, which is developed along the lines suggested by Kitagawa and by Retherford and Cho but without the limitations of their methods.  相似文献   
29.

A multi-item inventory model with constant demand and infinite replenishment is developed under the restrictions on storage area, total average shortage cost and total average inventory investment cost. These restrictions may be precise or imprecise. Here, it is assumed that inventory costs are directly proportional to the respective quantities, and unit purchase/production cost is inversely related to the demand. Restricted shortages are allowed but fully backlogged. First, the problem is formulated in crisp environment taking the deterministic and precise inventory parameters. It is solved by both geometric programming (GP) and gradient-based non-linear programming (NLP) methods. Later, the problem is formulated with fuzzy goals on constraints and objectives where impreciseness is introduced through linear membership functions. It is solved using the fuzzy geometric programming (FGP) method. The inventory models are illustrated with numerical values and compared with the crisp results. A sensitivity analysis on the optimum order quantity and average cost is also presented due to the variation in the tolerance of total average inventory investment cost and total average shortage cost following Dutta et al., 1993, Fuzzy Sets and Systems, 55, 133-142.  相似文献   
30.
ABSTRACT

This paper seeks to illuminate the significance of datafication for anti-poverty programmes, meaning social protection schemes designed specifically for poor people. The conversion of beneficiary populations into machine-readable data enables two core functions of social protection, those of recognising entitled beneficiaries and assigning entitlements connected to each anti-poverty scheme. Drawing on the incorporation of Aadhaar, India’s biometric population database, in the national agenda for social protection, we unpack a techno-rational perspective that crafts datafication as a means to enhance the effectiveness of anti-poverty schemes. Nevertheless, narratives collected in the field show multiple forms of data injustice on recipients, underpinned by Aadhaar’s functionality for a shift of the social protection agenda from in-kind subsidies to cash transfers. Based on such narratives the paper introduces a politically embedded view of data, framing datafication as a transformative force that contributes to reforming existing anti-poverty schemes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号