全文获取类型
收费全文 | 532篇 |
免费 | 32篇 |
专业分类
管理学 | 37篇 |
民族学 | 15篇 |
人口学 | 42篇 |
丛书文集 | 3篇 |
理论方法论 | 39篇 |
综合类 | 19篇 |
社会学 | 262篇 |
统计学 | 147篇 |
出版年
2024年 | 1篇 |
2023年 | 15篇 |
2022年 | 3篇 |
2021年 | 4篇 |
2020年 | 10篇 |
2019年 | 22篇 |
2018年 | 50篇 |
2017年 | 50篇 |
2016年 | 35篇 |
2015年 | 28篇 |
2014年 | 23篇 |
2013年 | 97篇 |
2012年 | 61篇 |
2011年 | 17篇 |
2010年 | 19篇 |
2009年 | 20篇 |
2008年 | 23篇 |
2007年 | 7篇 |
2006年 | 15篇 |
2005年 | 6篇 |
2004年 | 5篇 |
2003年 | 5篇 |
2002年 | 8篇 |
2001年 | 6篇 |
2000年 | 5篇 |
1999年 | 4篇 |
1998年 | 2篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1995年 | 1篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 3篇 |
1989年 | 2篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1980年 | 1篇 |
1969年 | 2篇 |
排序方式: 共有564条查询结果,搜索用时 375 毫秒
161.
Hamza Karčić 《Journal of Muslim Minority Affairs》2014,34(3):282-292
This article will analyse Bosnian Muslims response and contribution to the construction of the Hejaz Railway. Based on primary sources during the 1900–1908 period, the article will argue that Bosnian Muslims actively followed news about the progress of the railway and financially contributed to its construction. Bosnian Muslim contribution took the form of establishing committees for the collection of voluntary donations in a number of Bosnian towns in 1905 and 1906. The active involvement of Bosnian Muslims in the construction of the Hejaz Railway shows that the spiritual bonds between Bosnian Muslims living in Austria-Hungary and their Caliph in Istanbul were not completely severed by the Austro-Hungarian occupation of Bosnia in 1878. Following a brief survey of Bosnian Muslim history within the Austro-Hungarian Empire, the article describes the Hejaz Railway project and surveys the Bosnian Muslim contribution to the project. 相似文献
162.
School may represent a protective factor, boosting the mental health of the student body, while also representing a risk factor that heightens the potential for mental health problems. The present study aims to identify the individual and familial characteristics associated with the incidents of child sexual abuse (CSA) in Turkey’s school environment. The incidents involving school-related CSA constituted 5.6% (N = 125) of 2,238 cases. The following was discovered: an adult committed the majority (64%) of CSA in the school environment; most adult perpetrators were teachers (62.5%). This study determined that the perpetrators manipulated the victims via methods that included physical abuse (11.2%), threats (19.2%), tricks/deception (15.2%), and taking photographs/videos with sexual content (3.2%); and CSA incidents involved intercourse (15.2%); and almost three-quarter of the victims of CSA in the school environment reported the incident late. This study indicates that peer perpetrators abuse younger victims and a greater proportion of male victims relative to adult perpetrators. In light of these findings, school security must be improved, especially in public schools, and trainings aimed at preventing bullying and sexual abuse (SA) should be given to all school staff, students, and parents. 相似文献
163.
164.
Between 1946 and 1953, leading scientists met in New York in the context of the so-called Macy conferences, often linked to the emergence of cybernetics. They hankered for a new vision of mind and society. The traumatism of WW2 was implicit but omnipresent, and the Cold War was beginning. Macy key tools and concepts about information, the value of information, and computer artefacts have finally produced a new world, in particular an organisational world, which is far removed from their original dreams. Organisational members are now involved in difficult situations in terms of organising, that is, new modes of performativity which are difficult to comprehend and deal with; a transformation of meaning and knowledge in collective activity; and a threat to well-being and happiness as mental activities, cognition and bodies are increasingly disconnected. We use the Macy conferences as an entry point to reflect on the ‘longue durée’ evolution of the material underpinnings of information and their relationship with organising. We first explore the new conceptualisations at the core of the Macy conferences, information, value of information, and computer artefacts. We then put the Macy conferences into a socio-historical perspective by means of two theoretical approaches, iconographical and semiotic; this involves a historical comparison between the ‘screen-images’ or our Information Age and the ‘object-images’ of medieval cathedrals. We show that there are important disruptions in organising grounded in a new semiosis, which emerged over the longue durée of collective activity, and was articulated further during the Macy conferences. We describe this long-term evolution as the post-Macy paradox. 相似文献
165.
ABSTRACTIn certain situations that shall be undoubtedly more and more common in the Big Data era, the datasets available are so massive that computing statistics over the full samples is hardly feasible, if not unfeasible. A natural approach in this context consists in using survey schemes and substituting the ‘full data’ statistics with their counterparts based on the resulting random samples, of manageable size. It is the main purpose of this paper to investigate the impact of survey sampling on statistical learning methods based on empirical risk minimization through the standard binary classification problem, considered here as a ‘case in point’. Precisely, we prove that, in presence of auxiliary information, appropriate use of optimally coupled Poisson survey plans may not affect much the learning rates, while possibly reducing significantly the number of terms that must be averaged to compute the empirical risk functional with overwhelming probability. These striking results are next shown to extend to more general sampling schemes by means of a coupling technique, originally introduced by Hajek [Asymptotic theory of rejective sampling with varying probabilities from a finite population. Ann Math Stat. 1964;35(4):1491–1523]. 相似文献
166.
Often in practice one is interested in the situation where the lifetime data are censored. Censorship is a common phenomenon frequently encountered when analyzing lifetime data due to time constraints. In this paper, the flexible Weibull distribution proposed in Bebbington et al. [A flexible Weibull extension, Reliab. Eng. Syst. Safety 92 (2007), pp. 719–726] is studied using maximum likelihood technics based on three different algorithms: Newton Raphson, Levenberg Marquardt and Trust Region reflective. The proposed parameter estimation method is introduced and proved to work from theoretical and practical point of view. On one hand, we apply a maximum likelihood estimation method using complete simulated and real data. On the other hand, we study for the first time the model using simulated and real data for type I censored samples. The estimation results are approved by a statistical test. 相似文献
167.
168.
In this article, we introduce a new form of distribution whose components have the Poisson or Skellam marginal distributions. This new specification allows the incorporation of relevant information on the nature of the correlations between every component. In addition, we present some properties of this distribution. Unlike the multivariate Poisson distribution, it can handle variables with positive and negative correlations. It should be noted that we are only interested in modeling covariances of order 2, which means between all pairs of variables. Some simulations are presented to illustrate the estimation methods. Finally, an application of soccer teams data will highlight the relationship between number of points per season and the goal differential by some covariates. 相似文献
169.
In this article, we propose a semi-parametric mode regression for a non linear model. We use an expectation-maximization algorithm in order to estimate the regression coefficients of modal non linear regression. We also establish asymptotic properties for the proposed estimator under assumptions of the error density. We investigate the performance through a simulation study. 相似文献
170.
In this article, we discuss finding the optimal k of (i) kth simple moving average, (ii) kth weighted moving average, and (iii) kth exponential weighted moving average based on simulated ARIMA(p, d, q) model. We run a simulation using the three above examining methods under specific conditions. The main finding is that 5th exponential weighted moving average (5th EWMA) ARIMA model is the best forecasting model among others, which means the optimal k = 5. For Turkish Telecommunications (TTKOM) stock market, real data reveal the similar results of simulation study. 相似文献