首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   998篇
  免费   42篇
  国内免费   4篇
管理学   63篇
劳动科学   1篇
民族学   30篇
人口学   84篇
丛书文集   91篇
理论方法论   78篇
综合类   273篇
社会学   294篇
统计学   130篇
  2024年   1篇
  2023年   12篇
  2022年   13篇
  2021年   15篇
  2020年   39篇
  2019年   32篇
  2018年   47篇
  2017年   57篇
  2016年   40篇
  2015年   45篇
  2014年   41篇
  2013年   121篇
  2012年   70篇
  2011年   55篇
  2010年   54篇
  2009年   37篇
  2008年   45篇
  2007年   43篇
  2006年   39篇
  2005年   48篇
  2004年   27篇
  2003年   28篇
  2002年   29篇
  2001年   26篇
  2000年   19篇
  1999年   15篇
  1998年   5篇
  1997年   9篇
  1996年   8篇
  1995年   4篇
  1994年   2篇
  1993年   5篇
  1992年   3篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1976年   1篇
  1968年   3篇
排序方式: 共有1044条查询结果,搜索用时 15 毫秒
81.
中国流通A股市场投资者实现回报率研究   总被引:1,自引:1,他引:1  
现实中的股票市场不可能完全符合资本市场有效性假设,因而把股票成交价格看作是股票的市场价值,并据此计算股票投资回报率的传统做法存在着明显的弊端。投资者实际实现的回报率对现实股票市场,特别是规范程度很低的我国股票市场的研究具有重要意义。本文提出了无需完全有效市场假设的现金概念及以此为基础的投资者实现回报率概念,并给出了现有条件下的投资者回报率计算公式和沪深两市的计算结果。  相似文献   
82.
Voluntary sector organizations claim to be private institutions acting for the public good. However, if the concept of public is disengaged from the state and connected instead to citizenship, VSOs can be shown to have both private and public origins, as well as private and public impacts. As citizens, VSOs are public organizations serving the public good through their purported representation of the people and civic leadership. The legitimacy of their assumption of these public roles remains a continuing challenge.  相似文献   
83.
本文采用试验研究方法,模拟价值链节点企业交易过程,研究了信任与激励两种价值链成本治理机制的治理效果以及它们之间的作用关系。试验结果显示,高度信任与基于价值链利益的激励机制均可以有效缓解或防范合作问题、协调问题和侵占问题,对价值链成本治理具有明显的治理效果。当价值链节点企业之间缺乏信任的时候,激励机制会失去效用;信任机制与激励机制之间具有显著的互补关系。  相似文献   
84.
85.
The main models of machine learning are briefly reviewed and considered for building a classifier to identify the Fragile X Syndrome (FXS). We have analyzed 172 patients potentially affected by FXS in Andalusia (Spain) and, by means of a DNA test, each member of the data set is known to belong to one of two classes: affected, not affected. The whole predictor set, formed by 40 variables, and a reduced set with only nine predictors significantly associated with the response are considered. Four alternative base classification models have been investigated: logistic regression, classification trees, multilayer perceptron and support vector machines. For both predictor sets, the best accuracy, considering both the mean and the standard deviation of the test error rate, is achieved by the support vector machines, confirming the increasing importance of this learning algorithm. Three ensemble methods - bagging, random forests and boosting - were also considered, amongst which the bagged versions of support vector machines stand out, especially when they are constructed with the reduced set of predictor variables. The analysis of the sensitivity, the specificity and the area under the ROC curve agrees with the main conclusions extracted from the accuracy results. All of these models can be fitted by free R programs.  相似文献   
86.
详细介绍了一种实用的过流过压保护电路及工作原理 ,该电路具有可靠性高、反应快等特点  相似文献   
87.
本文以张煌言年谱与文集为主轴,结合实地考察,勾画出张煌言(苍水)在舟山遗迹的大概轮廓;从横向与纵向两个层面对张煌言的思想、实践和个人品质进行评价,揭示传统文化的久远影响及其意义。文章还就张煌言与郑成功以及文天祥的对比,对历史“公正”与“不公正”作了深层次的哲学思考。  相似文献   
88.
89.
对苏州地铁某车站明挖基坑施工进行跟踪监测,及时掌握围护结构变形、支撑内力的变化动态,以指导施工确保基坑稳定。经过对比分析基坑有、无加固措施的变形和支撑内力的变化特征表明:基坑外水泥土搅拌桩加固措施的设置,可以有效地减小围护结构的水平变形,并且能够阻碍边坡滑移破坏面的发展,减小作用于地下连续墙上面的土压力,使得内支撑上的最大轴力减小。  相似文献   
90.
A qualitative study was carried out in four municipalities in four different conflict zones in Colombia. Intrafamilial violence and gender violence are studied through the testimonies of the people interviewed. The impact was analysed in terms of the exercise of control over the civilian population by paramilitaries in relation to subjectivity, the family, social networks and the prevailing moral order. In effect, the strengthening of barriers between traditional gender identities has enabled a de-structuring of traditional masculinity through moral co-optation, the reinforcement of traditional feminine identity and the objectification of the sexuality of young women, at the same time as they are manipulated sexually and emotionally. In general, strong legitimation of the model of the armed fighter as a paradigm of masculinity is found in children. In addition, the de-structuring of the family and its manipulation as a means of influence over civil society is one of the strategies employed for the installation of a regime of terror that fractures social networks. It does this through the erosion of confidence and the legitimation and mystification of the power of an actor whose mediation in inter-family and micro-social conflicts has been legitimated, instrumentalizing and scaling up traditional violence, taking advantage of the power vacuum and moral weaknesses in local culture.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号