首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15085篇
  免费   629篇
  国内免费   177篇
管理学   1538篇
劳动科学   2篇
民族学   117篇
人才学   1篇
人口学   397篇
丛书文集   991篇
理论方法论   527篇
综合类   8481篇
社会学   1238篇
统计学   2599篇
  2024年   18篇
  2023年   129篇
  2022年   119篇
  2021年   171篇
  2020年   296篇
  2019年   344篇
  2018年   387篇
  2017年   475篇
  2016年   419篇
  2015年   494篇
  2014年   811篇
  2013年   1592篇
  2012年   1067篇
  2011年   1048篇
  2010年   851篇
  2009年   791篇
  2008年   911篇
  2007年   1004篇
  2006年   931篇
  2005年   800篇
  2004年   702篇
  2003年   585篇
  2002年   487篇
  2001年   353篇
  2000年   270篇
  1999年   153篇
  1998年   83篇
  1997年   87篇
  1996年   84篇
  1995年   64篇
  1994年   60篇
  1993年   54篇
  1992年   42篇
  1991年   22篇
  1990年   29篇
  1989年   33篇
  1988年   24篇
  1987年   23篇
  1986年   21篇
  1985年   14篇
  1984年   15篇
  1983年   7篇
  1982年   6篇
  1981年   9篇
  1980年   2篇
  1979年   1篇
  1978年   1篇
  1977年   1篇
  1975年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
992.
制度变迁是指制度的替代、转换与交易过程。由于国家具有强制性、垄断性以及规 模经济的优势,不论是在制度变迁的需求和供给上,还是在不同类型的制度变迁以及解决制度变 迁的路径依赖上,国家都发挥着独特的作用。而中国经济体制的转型过程,从实质上说,就是一个 制度变迁的过程。为了顺利实现和尽早完成由计划经济体制向市场经济体制的转型,必须进一步 发挥国家在这一制度变迁中的积极作用。  相似文献   
993.
鲁迅小说的社会杂语分析   总被引:1,自引:0,他引:1       下载免费PDF全文
本文借用巴赫金有关长篇小说的话语理论和福柯有关话语权力的思想,对鲁迅小说作了新的解读。从整体上看,鲁迅小说以鲁镇和未庄为中心,构成了一个社会杂语的环境,其间六个层次的话语的运动,体现了世纪初处在流动、变化之中的乡土中国各个话 语集团较量的实况。其中,最引人注目的是三个话语集团:被剥夺了话语权、以他者话语为自己话语的“失语”的人们;尚未掌握话语权、只能以反常或疯狂的形式出现的代表新兴话语力量的“独语”的人们;处在传统话语与新兴话语张力中的“双语”的人们。鲁迅正是通过上述各种话语力量互相消长、互相激荡的运动的揭示,表达了对辛亥革命后局势的忧虑和对传统话语的批判。  相似文献   
994.
995.
Most public health risk assessments assume and combine a series of average, conservative, and worst-case values to derive a conservative point estimate of risk. This procedure has major limitations. This paper demonstrates a new methodology for extended uncertainty analyses in public health risk assessments using Monte Carlo techniques. The extended method begins as do some conventional methods--with the preparation of a spreadsheet to estimate exposure and risk. This method, however, continues by modeling key inputs as random variables described by probability density functions (PDFs). Overall, the technique provides a quantitative way to estimate the probability distributions for exposure and health risks within the validity of the model used. As an example, this paper presents a simplified case study for children playing in soils contaminated with benzene and benzo(a)pyrene (BaP).  相似文献   
996.
Recently, efforts to model and assess a system's resilience to disruptions due to environmental and adversarial threats have increased substantially. Researchers have investigated resilience in many disciplines, including sociology, psychology, computer networks, and engineering systems, to name a few. When assessing engineering system resilience, the resilience assessment typically considers a single performance measure, a disruption, a loss of performance, the time required to recover, or a combination of these elements. We define and use a resilient engineered system definition that separates system resilience into platform and mission resilience. Most complex systems have multiple performance measures; this research proposes using multiple objective decision analysis to assess system resilience for systems with multiple performance measures using two distinct methods. The first method quantifies platform resilience and includes resilience and other “ilities” directly in the value hierarchy, while the second method quantifies mission resilience and uses the “ilities” in the calculation of the expected mission performance for every performance measure in the value hierarchy. We illustrate the mission resilience method using a transportation systems‐of‐systems network with varying levels of resilience due to the level of connectivity and autonomy of the vehicles and platform resilience by using a notional military example. Our analysis found that it is necessary to quantify performance in context with specific mission(s) and scenario(s) under specific threat(s) and then use modeling and simulation to help determine the resilience of a system for a given set of conditions. The example demonstrates how incorporating system mission resilience can improve performance for some performance measures while negatively affecting others.  相似文献   
997.
Hammitt  James K.  Belsky  Eric S.  Levy  Jonathan I.  Graham  John D. 《Risk analysis》1999,19(6):1037-1058
Residential building codes intended to promote health and safety may produce unintended countervailing risks by adding to the cost of construction. Higher construction costs increase the price of new homes and may increase health and safety risks through income and stock effects. The income effect arises because households that purchase a new home have less income remaining for spending on other goods that contribute to health and safety. The stock effect arises because suppression of new-home construction leads to slower replacement of less safe housing units. These countervailing risks are not presently considered in code debates. We demonstrate the feasibility of estimating the approximate magnitude of countervailing risks by combining the income effect with three relatively well understood and significant home-health risks. We estimate that a code change that increases the nationwide cost of constructing and maintaining homes by $150 (0.1% of the average cost to build a single-family home) would induce offsetting risks yielding between 2 and 60 premature fatalities or, including morbidity effects, between 20 and 800 lost quality-adjusted life years (both discounted at 3%) each year the code provision remains in effect. To provide a net health benefit, the code change would need to reduce risk by at least this amount. Future research should refine these estimates, incorporate quantitative uncertainty analysis, and apply a full risk-tradeoff approach to real-world case studies of proposed code changes.  相似文献   
998.
Challenges to the Acceptance of Probabilistic Risk Analysis   总被引:3,自引:0,他引:3  
Bier  Vicki M. 《Risk analysis》1999,19(4):703-710
This paper discusses a number of the key challenges to the acceptance and application of probabilistic risk analysis (PRA). Those challenges include: (a) the extensive reliance on subjective judgment in PRA, requiring the development of guidance for the use of PRA in risk-informed regulation, and possibly the development of robust or reference prior distributions to minimize the reliance on judgment; and (b) the treatment of human performance in PRA, including not only human error per se but also management and organizational factors more broadly. All of these areas are seen as presenting interesting research challenges at the interface between engineering and other disciplines.  相似文献   
999.
Borgan and Langholz (1997) describe a method for estimating the parameter functions in Aalen's linear hazard regression model from sampled risk set data. Using a counting process formulation and the martingale central limit theorem, we provide a study of the asymptotic distributional properties of the estimator. The results are applied to study the efficiencies of the nested case-control and counter-matched designs relative to a full cohort analysis.  相似文献   
1000.
A system that includes a number of terrorist cells is considered. The cells can consist of one or more terrorists. The current number of terrorist cells is further denoted by N(t), where t is a current time counted from any appropriate origin. The objective is to find the evolution of the system in terms of N(t) and some interpretable parameters, such as the initial number of the terrorist cells N0=N(0), the cell disabling rate constant lambda (or the cell half-life t1/2), and the rate of formation of new cells P. The cost-effectiveness analysis, performed in the framework of the model, reveals that the effectiveness of disabling a terrorist cell is getting worse after 2-3 half-lives of a cell, which shows that if the anti-terrorist actions have not reached their goal during that time, the respective policy should be considered for revision, using the risk assessment consideration. Another important issue raised concerns balancing the efforts related to counterterrorism actions inside the system and the efforts protecting its borders. The respective data analysis is suggested and illustrated using simulated data.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号