首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   97篇
  免费   4篇
管理学   12篇
人口学   1篇
理论方法论   8篇
综合类   1篇
社会学   75篇
统计学   4篇
  2023年   4篇
  2020年   3篇
  2019年   3篇
  2018年   3篇
  2017年   2篇
  2016年   5篇
  2015年   3篇
  2014年   2篇
  2013年   15篇
  2012年   1篇
  2011年   3篇
  2010年   3篇
  2009年   2篇
  2008年   2篇
  2007年   1篇
  2006年   3篇
  2005年   2篇
  2004年   1篇
  2003年   4篇
  2002年   2篇
  2000年   3篇
  1999年   1篇
  1998年   1篇
  1997年   3篇
  1996年   2篇
  1995年   3篇
  1993年   1篇
  1991年   2篇
  1989年   2篇
  1987年   2篇
  1986年   1篇
  1985年   3篇
  1984年   1篇
  1982年   1篇
  1979年   2篇
  1978年   1篇
  1977年   3篇
  1976年   1篇
  1970年   2篇
  1968年   2篇
排序方式: 共有101条查询结果,搜索用时 22 毫秒
41.
Explore the challenging paradoxes that run throughout health care and consider ways to accept them into an organization.  相似文献   
42.
The application of stochastic heuristic, like tabu search or simulated annealing, to address hard discrete optimization problems has been an important advance for efficiently obtaining good solutions in a reasonable amount of computing time. A challenge when applying such heuristics is assessing when a particular set of parameter values yields better performance compared to other such sets of parameter values. For example, it can be difficult to determine the optimal mix of memory types to incorporate into tabu search. This in turn prompts users to undertake a trial and error phase to determine the best combination of parameter settings for the problem under study. Moreover, for a given problem instance, one set of heuristic parameter settings may yield a better solution than another set of parameters, for a given initial solution. However, the performance of this heuristic on this instance for a single heuristic execution is not sufficient to assert that the first set of parameter settings will always produce superior results than the second set of parameters, for all initial solutions.  相似文献   
43.
44.
45.
The objective of this research is to present a method for evaluating the performance of access control security systems, such as airport security operations. This requires the examination of security system architectures, which involve security technology devices and the algorithms that coordinate their operations. Dependence between device responses in multiple-device systems is a critical practical issue in assessing the performance of such architectures, though no results on this problem have appeared in the literature. This paper presents a method for evaluating when multipledevice security systems with overlapping capabilities are cost-effective. This is achieved using a dependency structure for security system devices to quantify how various technologies interact and to measure the impact of device dependence on system error probabilities. A measure of device response dependence for a two-device system is defined and its properties are explored, including bounds on the dependency measure. The effect of dependence on the system Type I and Type II error probabilities is examined for the two-device system. System performance is compared for independent vs. dependent device responses and desirable dependence relationships are identified. Results are also presented for a cascading sequence of devices. An example is presented to illustrate the results for the two-device system. Implications of these results are discussed, such as how they can be used to identify the optimal use of security devices and to determine whether new technologies warrant investment.  相似文献   
46.
Although the efficacy of individual treatments of affective disorders has been well-documented, there are also significant limitations to existing treatments. In the last decade attention has focused increasingley on the interpersonal context of affective illness, and on marital and family relationships in particular. As a result, a number of approaches have been developed which directly involve family members in treatment. In this article we evaluate the current status of marital and family therapies for affective illness. We begin with a discussion of several lines of research bearing on the relationships between family processes and affective illness. The available treatment outcome data evaluating the efficacy of marital and family interventions are then reviewed, with particular attention paid to predictors of treatment success and cost efficacy issues. Finally, we suggest several priorities for future research.  相似文献   
47.
48.
Anthony Giddens' The Politics of Climate Change represents a significant shift in the way in which he addresses ecological politics. In this book, he rejects the relevance of environmentalism and demarcates climate‐change policy from life politics. Giddens addresses climate change in the technocratic mode of simple rather than reflexive modernization. However, Giddens' earlier sociological theory provides the basis for a more reflexive understanding of climate change. Climate change instantiates how, in high modernity, the existential contradiction of the human relationship with nature returns in new form, expressed in life politics and entangled with the structural contradictions of the capitalist state. The interlinking of existential and structural contradiction is manifested in the tension between life politics and the capitalist nation‐state. This tension is key for understanding the failures so far of policy responses to climate change.  相似文献   
49.
Social group work scholars and practitioners have begun to locate and recognize important sites for thinking about and practicing social group work as increasing evidence demonstrates its diminishing importance. This article identifies faculty meetings as a significant site for integrating social group work more fully into departments and schools of social work and helping to achieve the profession's social justice mission. Challenging the meaning of the faculty meeting and thinking of it as a faculty group is a necessary prerequisite to realize this goal. A set of principles is presented and next steps explored to reclaim and reinsert the value of social group work for the profession today.  相似文献   
50.
The terrorist attacks of September 11, 2001 have resulted in dramatic changes in aviation security. As of early 2003, an estimated 1,100 explosive detection systems (EDS) and 6,000 explosive trace detection machines (ETD) have been deployed to ensure 100% checked baggage screening at all commercial airports throughout the United States. The prohibitive costs associated with deploying and operating such devices is a serious issue for the Transportation Security Administration. This article evaluates the cost effectiveness of the explosive detection technologies currently deployed to screen checked baggage as well as new technologies that could be used in the future. Both single-device and two-device systems are considered. In particular, the expected annual direct cost of using these devices for 100% checked baggage screening under various scenarios is obtained and the tradeoffs between using single- and two-device strategies are studied. The expected number of successful threats under the different checked baggage screening scenarios with 100% checked baggage screening is also obtained. Lastly, a risk-based screening strategy proposed in the literature is analyzed. The results reported suggest that for the existing security setup, with current device costs and probability parameters, single-device systems are less costly and have fewer expected number of successful threats than two-device systems due to the way the second device affects the alarm or clear decision. The risk-based approach is found to have the potential to significantly improve security. The cost model introduced provides an effective tool for the execution of cost-benefit analyses of alternative device configurations for aviation-checked baggage security screening.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号