首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   532篇
  免费   32篇
管理学   37篇
民族学   15篇
人口学   42篇
丛书文集   3篇
理论方法论   39篇
综合类   19篇
社会学   262篇
统计学   147篇
  2024年   1篇
  2023年   15篇
  2022年   3篇
  2021年   4篇
  2020年   10篇
  2019年   22篇
  2018年   50篇
  2017年   50篇
  2016年   35篇
  2015年   28篇
  2014年   23篇
  2013年   97篇
  2012年   61篇
  2011年   17篇
  2010年   19篇
  2009年   20篇
  2008年   23篇
  2007年   7篇
  2006年   15篇
  2005年   6篇
  2004年   5篇
  2003年   5篇
  2002年   8篇
  2001年   6篇
  2000年   5篇
  1999年   4篇
  1998年   2篇
  1997年   2篇
  1996年   2篇
  1995年   1篇
  1994年   3篇
  1993年   2篇
  1992年   1篇
  1991年   3篇
  1989年   2篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1980年   1篇
  1969年   2篇
排序方式: 共有564条查询结果,搜索用时 375 毫秒
161.
This article will analyse Bosnian Muslims response and contribution to the construction of the Hejaz Railway. Based on primary sources during the 1900–1908 period, the article will argue that Bosnian Muslims actively followed news about the progress of the railway and financially contributed to its construction. Bosnian Muslim contribution took the form of establishing committees for the collection of voluntary donations in a number of Bosnian towns in 1905 and 1906. The active involvement of Bosnian Muslims in the construction of the Hejaz Railway shows that the spiritual bonds between Bosnian Muslims living in Austria-Hungary and their Caliph in Istanbul were not completely severed by the Austro-Hungarian occupation of Bosnia in 1878. Following a brief survey of Bosnian Muslim history within the Austro-Hungarian Empire, the article describes the Hejaz Railway project and surveys the Bosnian Muslim contribution to the project.  相似文献   
162.
School may represent a protective factor, boosting the mental health of the student body, while also representing a risk factor that heightens the potential for mental health problems. The present study aims to identify the individual and familial characteristics associated with the incidents of child sexual abuse (CSA) in Turkey’s school environment. The incidents involving school-related CSA constituted 5.6% (N = 125) of 2,238 cases. The following was discovered: an adult committed the majority (64%) of CSA in the school environment; most adult perpetrators were teachers (62.5%). This study determined that the perpetrators manipulated the victims via methods that included physical abuse (11.2%), threats (19.2%), tricks/deception (15.2%), and taking photographs/videos with sexual content (3.2%); and CSA incidents involved intercourse (15.2%); and almost three-quarter of the victims of CSA in the school environment reported the incident late. This study indicates that peer perpetrators abuse younger victims and a greater proportion of male victims relative to adult perpetrators. In light of these findings, school security must be improved, especially in public schools, and trainings aimed at preventing bullying and sexual abuse (SA) should be given to all school staff, students, and parents.  相似文献   
163.
164.
Between 1946 and 1953, leading scientists met in New York in the context of the so-called Macy conferences, often linked to the emergence of cybernetics. They hankered for a new vision of mind and society. The traumatism of WW2 was implicit but omnipresent, and the Cold War was beginning. Macy key tools and concepts about information, the value of information, and computer artefacts have finally produced a new world, in particular an organisational world, which is far removed from their original dreams. Organisational members are now involved in difficult situations in terms of organising, that is, new modes of performativity which are difficult to comprehend and deal with; a transformation of meaning and knowledge in collective activity; and a threat to well-being and happiness as mental activities, cognition and bodies are increasingly disconnected. We use the Macy conferences as an entry point to reflect on the ‘longue durée’ evolution of the material underpinnings of information and their relationship with organising. We first explore the new conceptualisations at the core of the Macy conferences, information, value of information, and computer artefacts. We then put the Macy conferences into a socio-historical perspective by means of two theoretical approaches, iconographical and semiotic; this involves a historical comparison between the ‘screen-images’ or our Information Age and the ‘object-images’ of medieval cathedrals. We show that there are important disruptions in organising grounded in a new semiosis, which emerged over the longue durée of collective activity, and was articulated further during the Macy conferences. We describe this long-term evolution as the post-Macy paradox.  相似文献   
165.
ABSTRACT

In certain situations that shall be undoubtedly more and more common in the Big Data era, the datasets available are so massive that computing statistics over the full samples is hardly feasible, if not unfeasible. A natural approach in this context consists in using survey schemes and substituting the ‘full data’ statistics with their counterparts based on the resulting random samples, of manageable size. It is the main purpose of this paper to investigate the impact of survey sampling on statistical learning methods based on empirical risk minimization through the standard binary classification problem, considered here as a ‘case in point’. Precisely, we prove that, in presence of auxiliary information, appropriate use of optimally coupled Poisson survey plans may not affect much the learning rates, while possibly reducing significantly the number of terms that must be averaged to compute the empirical risk functional with overwhelming probability. These striking results are next shown to extend to more general sampling schemes by means of a coupling technique, originally introduced by Hajek [Asymptotic theory of rejective sampling with varying probabilities from a finite population. Ann Math Stat. 1964;35(4):1491–1523].  相似文献   
166.
Often in practice one is interested in the situation where the lifetime data are censored. Censorship is a common phenomenon frequently encountered when analyzing lifetime data due to time constraints. In this paper, the flexible Weibull distribution proposed in Bebbington et al. [A flexible Weibull extension, Reliab. Eng. Syst. Safety 92 (2007), pp. 719–726] is studied using maximum likelihood technics based on three different algorithms: Newton Raphson, Levenberg Marquardt and Trust Region reflective. The proposed parameter estimation method is introduced and proved to work from theoretical and practical point of view. On one hand, we apply a maximum likelihood estimation method using complete simulated and real data. On the other hand, we study for the first time the model using simulated and real data for type I censored samples. The estimation results are approved by a statistical test.  相似文献   
167.
168.
In this article, we introduce a new form of distribution whose components have the Poisson or Skellam marginal distributions. This new specification allows the incorporation of relevant information on the nature of the correlations between every component. In addition, we present some properties of this distribution. Unlike the multivariate Poisson distribution, it can handle variables with positive and negative correlations. It should be noted that we are only interested in modeling covariances of order 2, which means between all pairs of variables. Some simulations are presented to illustrate the estimation methods. Finally, an application of soccer teams data will highlight the relationship between number of points per season and the goal differential by some covariates.  相似文献   
169.
In this article, we propose a semi-parametric mode regression for a non linear model. We use an expectation-maximization algorithm in order to estimate the regression coefficients of modal non linear regression. We also establish asymptotic properties for the proposed estimator under assumptions of the error density. We investigate the performance through a simulation study.  相似文献   
170.
In this article, we discuss finding the optimal k of (i) kth simple moving average, (ii) kth weighted moving average, and (iii) kth exponential weighted moving average based on simulated ARIMA(p, d, q) model. We run a simulation using the three above examining methods under specific conditions. The main finding is that 5th exponential weighted moving average (5th EWMA) ARIMA model is the best forecasting model among others, which means the optimal k = 5. For Turkish Telecommunications (TTKOM) stock market, real data reveal the similar results of simulation study.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号