首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   667篇
  免费   32篇
管理学   101篇
民族学   6篇
人才学   1篇
人口学   41篇
丛书文集   5篇
理论方法论   72篇
综合类   8篇
社会学   359篇
统计学   106篇
  2023年   9篇
  2022年   2篇
  2021年   6篇
  2020年   25篇
  2019年   31篇
  2018年   31篇
  2017年   23篇
  2016年   27篇
  2015年   21篇
  2014年   17篇
  2013年   121篇
  2012年   22篇
  2011年   19篇
  2010年   19篇
  2009年   17篇
  2008年   22篇
  2007年   16篇
  2006年   23篇
  2005年   26篇
  2004年   12篇
  2003年   17篇
  2002年   16篇
  2001年   15篇
  2000年   15篇
  1999年   13篇
  1998年   10篇
  1997年   5篇
  1996年   9篇
  1995年   3篇
  1994年   6篇
  1993年   10篇
  1992年   3篇
  1991年   9篇
  1990年   6篇
  1989年   2篇
  1988年   5篇
  1987年   3篇
  1986年   5篇
  1985年   10篇
  1984年   7篇
  1983年   6篇
  1982年   7篇
  1981年   2篇
  1980年   4篇
  1979年   2篇
  1978年   5篇
  1976年   6篇
  1970年   2篇
  1968年   1篇
  1967年   1篇
排序方式: 共有699条查询结果,搜索用时 250 毫秒
121.
ABSTRACT

Huge advances have been made in deepening and expanding our knowledge of gendered migration over the last decades in both theoretical and methodological terms. Empirically it is, however, still the case that North–South migration is at the basis of most theorisations, leaving the characteristics of South–South migration at the margins. In this paper we, therefore, shift the focus to intra- and trans-regional migration in a South–South context in exploring what this means for women migrants. While feminist scholars have highlighted care and the ways in which migration challenges social reproduction as an important issue, mainstream approaches continue to focus predominantly on the ‘productive’ lives of migrant workers. With migration theories still largely drawing on the experience of South–North migration, there continues to be relatively little understanding of South–South migration’s gender dynamics, despite the fact that many of the highly feminised, yet hyper-precarious, migration flows occur intra-regionally.  相似文献   
122.
Large‐scale outages on real‐world critical infrastructures, although infrequent, are increasingly disastrous to our society. In this article, we are primarily concerned with power transmission networks and we consider the problem of allocation of generation to distributors by rewiring links under the objectives of maximizing network resilience to cascading failure and minimizing investment costs. The combinatorial multiobjective optimization is carried out by a nondominated sorting binary differential evolution (NSBDE) algorithm. For each generators–distributors connection pattern considered in the NSBDE search, a computationally cheap, topological model of failure cascading in a complex network (named the Motter‐Lai [ML] model) is used to simulate and quantify network resilience to cascading failures initiated by targeted attacks. The results on the 400 kV French power transmission network case study show that the proposed method allows us to identify optimal patterns of generators–distributors connection that improve cascading resilience at an acceptable cost. To verify the realistic character of the results obtained by the NSBDE with the embedded ML topological model, a more realistic but also more computationally expensive model of cascading failures is adopted, based on optimal power flow (namely, the ORNL‐Pserc‐Alaska) model). The consistent results between the two models provide impetus for the use of topological, complex network theory models for analysis and optimization of large infrastructures against cascading failure with the advantages of simplicity, scalability, and low computational cost.  相似文献   
123.
In this article, a classification model based on the majority rule sorting (MR‐Sort) method is employed to evaluate the vulnerability of safety‐critical systems with respect to malevolent intentional acts. The model is built on the basis of a (limited‐size) set of data representing (a priori known) vulnerability classification examples. The empirical construction of the classification model introduces a source of uncertainty into the vulnerability analysis process: a quantitative assessment of the performance of the classification model (in terms of accuracy and confidence in the assignments) is thus in order. Three different app oaches are here considered to this aim: (i) a model–retrieval‐based approach, (ii) the bootstrap method, and (iii) the leave‐one‐out cross‐validation technique. The analyses are presented with reference to an exemplificative case study involving the vulnerability assessment of nuclear power plants.  相似文献   
124.
Santelmann  M.  Hulse  D.  Wright  M.  Enright  C.  Branscomb  A.  Tchintcharauli-Harrison  M.  Bolson  J. 《Urban Ecosystems》2019,22(6):1149-1164
Urban Ecosystems - Effective, sustainable management of urban water systems, including drinking water, stormwater, wastewater, and natural water systems, is critical to the health and well-being of...  相似文献   
125.
126.
Evidence‐based management (EBM) has been subject to a number of persuasive critiques in recent years. Concerns have been raised that: EBM over‐privileges rationality as a basis for decision‐making; ‘scientific’ evidence is insufficient and incomplete as a basis for management practice; understanding of how EBM actually plays out in practice is limited; and, although ideas were originally taken from evidence‐based medicine, individual‐situated expertise has been forgotten in the transfer. To address these concerns, the authors adopted an approach of ‘opening up’ the decision process, the decision‐maker and the context (Langley et al. ( 1995 ). ‘Opening up decision making: the view from the black stool’, Organization Science, 6, pp. 260–279). The empirical investigation focuses on an EBM decision process involving an operations management problem in a hospital emergency department in Australia. Based on interview and archival research, it describes how an EBM decision process was enacted by a physician manager. It identifies the role of ‘fit’ between the decision‐maker and the organizational context in enabling an evidence‐based process and develops insights for EBM theory and practice.  相似文献   
127.
128.
Social workers and medical professionals have an ambiguous relationship. Though expected to work together within the child protection regulations of the Children Act 1989, there are many tensions. In general, social workers and health visitors enjoy close working relationships, but tensions are frequently experienced as one proceeds higher up the medical hierarchy. The reasons for this may be numerous, but in practice may obstruct speedy action in detection and prevention of disease which is social in aetiology — yet all professionals have an important role. I hope to demonstrate this in the following case study, where ‘failure to thrive’ took 18 months to evidence but, without inter‐agency working, might have proved fatal to the child. Copyright © 2000 John Wiley & Sons, Ltd.  相似文献   
129.
This article discusses the unequal impact of Covid-19 on the lives of the children of survivors of modern slavery, child victims of exploitation and children at risk of exploitation in the UK. It draws on research that has analysed the risks and impacts of Covid-19 on victims and survivors of modern slavery. It explores how pandemic responses may have hindered these children's rights to education, food, safety, development and participation and representation in legal processes. It suggests that the pandemic should be used as an impetus to address inequalities that existed pre-Covid-19 and those that have been exacerbated by it.  相似文献   
130.
This paper develops asymptotic distribution theory for GMM estimators and test statistics when some or all of the parameters are weakly identified. General results are obtained and are specialized to two important cases: linear instrumental variables regression and Euler equations estimation of the CCAPM. Numerical results for the CCAPM demonstrate that weak‐identification asymptotics explains the breakdown of conventional GMM procedures documented in previous Monte Carlo studies. Confidence sets immune to weak identification are proposed. We use these results to inform an empirical investigation of various CCAPM specifications; the substantive conclusions reached differ from those obtained using conventional methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号