首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   567篇
  免费   17篇
  国内免费   10篇
管理学   26篇
民族学   3篇
人口学   11篇
丛书文集   29篇
理论方法论   23篇
综合类   368篇
社会学   52篇
统计学   82篇
  2024年   1篇
  2023年   2篇
  2022年   4篇
  2021年   7篇
  2020年   9篇
  2019年   7篇
  2018年   9篇
  2017年   13篇
  2016年   7篇
  2015年   12篇
  2014年   27篇
  2013年   57篇
  2012年   22篇
  2011年   36篇
  2010年   25篇
  2009年   23篇
  2008年   29篇
  2007年   42篇
  2006年   41篇
  2005年   37篇
  2004年   29篇
  2003年   44篇
  2002年   34篇
  2001年   30篇
  2000年   12篇
  1999年   9篇
  1998年   4篇
  1997年   5篇
  1996年   5篇
  1995年   2篇
  1994年   5篇
  1993年   1篇
  1991年   1篇
  1990年   1篇
  1980年   1篇
  1975年   1篇
排序方式: 共有594条查询结果,搜索用时 15 毫秒
1.
无灵句是英语中一种很重要的句式结构,能否掌握无灵句的特点及其翻译方法直接影响到英语学习者的学习效果。本文主要概括了无灵句的特点及其分类,并且归纳出较为行之有效的翻译方法。  相似文献   
2.
This report summarizes the proceedings of a conference on quantitative methods for assessing the risks of developmental toxicants. The conference was planned by a subcommittee of the National Research Council's Committee on Risk Assessment Methodology 4 in conjunction with staff from several federal agencies, including the U.S. Environmental Protection Agency, U.S. Food and Drug Administration, U.S. Consumer Products Safety Commission, and Health and Welfare Canada. Issues discussed at the workshop included computerized techniques for hazard identification, use of human and animal data for defining risks in a clinical setting, relationships between end points in developmental toxicity testing, reference dose calculations for developmental toxicology, analysis of quantitative dose-response data, mechanisms of developmental toxicity, physiologically based pharmacokinetic models, and structure-activity relationships. Although a formal consensus was not sought, many participants favored the evolution of quantitative techniques for developmental toxicology risk assessment, including the replacement of lowest observed adverse effect levels (LOAELs) and no observed adverse effect levels (NOAELs) with the benchmark dose methodology.  相似文献   
3.
In this paper, we present an access network design problem with end-to-end quality of service (QoS) requirement. The problem can be conceptualized as a two-level hierarchical location-allocation problem on the tree topology with nonlinear side constraints. The objective function of the nonlinear mixed integer programming model minimizes the total cost of switch and fiber cable, while satisfying demand within the prescribed level of QoS. By exploiting the inherent structure of the nonlinear QoS constraints, we develop linearization techniques for finding an optimal solution. Also, we devise an effective exact optimal algorithm within the context of disjunctive constraint generation. We present promising computational results that demonstrate the effectiveness of the proposed solution procedure.  相似文献   
4.
In quantitative trait linkage studies using experimental crosses, the conventional normal location-shift model or other parameterizations may be unnecessarily restrictive. We generalize the mapping problem to a genuine nonparametric setup and provide a robust estimation procedure for the situation where the underlying phenotype distributions are completely unspecified. Classical Wilcoxon–Mann–Whitney statistics are employed for point and interval estimation of QTL positions and effects.  相似文献   
5.
早在社会学诞生之初,其创始人孔德就将社会学确定为一门关于"社会的科学",称社会学为"实证的哲学".由于科学自身以及科学研究方法存在的局限性,这也意味着作为科学的社会学一系列问题的开始.正因如此,对于社会学的科学性含义,社会学实证方法的重要性,定量研究对于社会学理论发展的基础性意义等,有必要作进一步探讨.  相似文献   
6.
In this article, MA and doctoral dissertations (673) on public relations written at Turkish universities (1984–2007) are examined in order to gain an understanding of the level of the theses within the discipline and that subjects are studied, too. The conclusion is that their contribution to public relations’ improvement and especially theory building has been negligible. Written theses are standing out the practical or operational, and no existence any dissertations related to public relations theory.  相似文献   
7.
The randomized response technique (RRT) is an important tool, commonly used to avoid biased answers in survey on sensitive issues by preserving the respondents’ privacy. In this paper, we introduce a data collection method for survey on sensitive issues combining both the unrelated-question RRT and the direct question design. The direct questioning method is utilized to obtain responses to a non sensitive question that is related to the innocuous question from the unrelated-question RRT. These responses serve as additional information that can be used to improve the estimation of the prevalence of the sensitive behavior. Furthermore, we propose two new methods for the estimation of the proportion of respondents possessing the sensitive attribute under a missing data setup. More specifically, we develop the weighted estimator and the weighted conditional likelihood estimator. The performances of our estimators are studied numerically and compared with that of an existing one. Both proposed estimators are more efficient than the Greenberg's estimator. We illustrate our methods using real data from a survey study on illegal use of cable TV service in Taiwan.  相似文献   
8.
ABSTRACT

This paper outlines the notion of ‘algorithmic technique’ as a middle ground between concrete, implemented algorithms and the broader study and theorization of software. Algorithmic techniques specify principles and methods for doing things in the medium of software and they thus constitute units of knowledge and expertise in the domain of software making. I suggest that algorithmic techniques are a suitable object of study for the humanities and social science since they capture the central technical principles behind actual software, but can generally be described in accessible language. To make my case, I focus on the field of information ordering and, first, discuss the wider historical trajectory of formal or ‘mechanical’ reasoning applied to matters of commerce and government before, second, moving to the investigation of a particular algorithmic technique, the Bayes classifier. This technique is explicated through a reading of the original work of M. E. Maron in the early 1960 and presented as a means to subject empirical, ‘datafied’ reality to an interested reading that confers meaning to each variable in relation to an operational goal. After a discussion of the Bayes classifier in relation to the question of power, the paper concludes by coming back to its initial motive and argues for increased attention to algorithmic techniques in the study of software.  相似文献   
9.
In this article, we introduce for the first time, the blank card methods for estimation of finite population mean of a sensitive variable. Two generic randomization devices are suggested, and for each device we identify the choices of special models. We introduce additive, multiplicative, and combination of both additive and multiplicative scrambling models that require use of a non sensitive variable. We derive the basic statistical properties of each model. It is interesting to note that various existing estimators can be viewed as the special cases of those presented here. The statistical efficiency of proposed techniques is compared with Greenberg et al. (1971 Greenberg, B.G., Kuebler Jr, R.R., Abernathy, J.R., Horvitz, D.G. (1971). Application of the randomized response technique in obtaining quantitative data. J. Am. Stat. Assoc. 66(334):243250.[Taylor &; Francis Online], [Web of Science ®] [Google Scholar]) and modified Perri (2008 Perri, P.F. (2008). Modified randomized devices for Simmons’ model. Model Assisted Stat. Appl. 3(3):233239. [Google Scholar]) model. The proposed devices can easily be adjusted to achieve the required efficiency level by making suitable choices of different design parameters.  相似文献   
10.
This study investigates the value of techniques of neutralization in understanding how people involved in marginal to widely deviant behaviors perform identity work. Based on 33 in‐depth interviews with older adult gamblers, we show how techniques of neutralization are used to align personal and social identities. We describe the techniques of neutralizations our participants use along a continuum of gambling involvement, showing how techniques differ in variety and content and are contingent on larger narratives about appropriate behaviors, identities, and selves operating in contemporary society. Our research helps to refine sociologists' understandings of relationships between levels of involvement in deviant behaviors and identity work.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号