全文获取类型
收费全文 | 4310篇 |
免费 | 154篇 |
国内免费 | 59篇 |
专业分类
管理学 | 258篇 |
劳动科学 | 1篇 |
民族学 | 42篇 |
人口学 | 220篇 |
丛书文集 | 471篇 |
理论方法论 | 361篇 |
综合类 | 2890篇 |
社会学 | 252篇 |
统计学 | 28篇 |
出版年
2024年 | 14篇 |
2023年 | 52篇 |
2022年 | 49篇 |
2021年 | 64篇 |
2020年 | 84篇 |
2019年 | 76篇 |
2018年 | 77篇 |
2017年 | 87篇 |
2016年 | 128篇 |
2015年 | 130篇 |
2014年 | 239篇 |
2013年 | 254篇 |
2012年 | 302篇 |
2011年 | 345篇 |
2010年 | 274篇 |
2009年 | 299篇 |
2008年 | 260篇 |
2007年 | 320篇 |
2006年 | 352篇 |
2005年 | 275篇 |
2004年 | 222篇 |
2003年 | 186篇 |
2002年 | 134篇 |
2001年 | 106篇 |
2000年 | 69篇 |
1999年 | 27篇 |
1998年 | 9篇 |
1997年 | 11篇 |
1996年 | 13篇 |
1995年 | 7篇 |
1994年 | 8篇 |
1993年 | 7篇 |
1992年 | 7篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1989年 | 5篇 |
1988年 | 4篇 |
1987年 | 8篇 |
1986年 | 1篇 |
1985年 | 3篇 |
1984年 | 5篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1981年 | 2篇 |
排序方式: 共有4523条查询结果,搜索用时 15 毫秒
181.
农村人口老龄化的特殊性分析 总被引:7,自引:0,他引:7
我国人口老龄化问题日益突出,而农村人口老龄化不仅规模大且在具体问题上也有别于城市。本文分析了农村人口老龄化的成因及农村人口流动、社会保障、人口分布、农村收入水平引起的人口老龄化问题,最后提出解决相应问题的一些具体措施。 相似文献
182.
安全心智培训集成系统是根据组织的危机管理的需求而形成的智能模拟系统,主要分为需求分析系统与安全心智培训系统两大部分,其中,需求分析系统主要能识别生产过程中的风险源、发现生产环节中的脆弱性因素,并通过对个体的基本能力、人格特质、情绪心理、抗逆能力等方面进行综合评价,以此确定特定岗位的胜任特征要求,进而制定个性化培训方案。在培训模式上,创造了安全心智培训七步法来达到受训者心智重塑的目的。安全心智培训主要包括目标定向、情境体验、心理疏导、规程对标、心智重塑、现场践行和评价反馈等七大环节,强调根据个体差异进行培训和效果评估,为制定和实施个性化培训方案提供依据,并且对于企业的安全管理提供全面、科学的理论和方法支持。 相似文献
183.
江苏省残疾人社会保障的现状调查与对策研究 总被引:2,自引:0,他引:2
享有社会保障是残疾人的基本权利,为残疾人提供全面的社会保障不仅是社会公平和正义的体现,更是衡量各国经济发展和人权进步的重要标志。本文在2006年“全国残疾人第二次抽样调查”数据的基础上,分析了江苏省残疾人社会保障的现状、主要影响因素及制度建设情况,提出了完善江苏省社会保障体系的对策建议。 相似文献
184.
证券市场的开放与规则的发展--以B股规则为中心的检讨 总被引:1,自引:0,他引:1
曾洋 《南京大学学报(哲学.人文科学.社会科学 )》2004,41(1)
人民币特种股(B股)市场作为我国证券市场开放的窗口和试验田,至今已存在10余年,相比它短暂的辉煌,如今的B股市场已经日益“边缘化”,除了进行投机,B股还能为中国证券市场开放做些什么?结合我国证券市场的特点,深入分析B股市场的发展及其规则变迁,认真总结其经验和教训,对我国在证券市场开放过程中建立健全相关法律制度很有借鉴意义。 相似文献
185.
对认证的口令基组密钥协商协议进行安全分析,指出传送数据中的冗余导致协议的不安全。基于Burmester and Desmedt的协议,给出一种改进的协议。该协议的计算复杂度较低,通信轮数较少;该协议不但满足前向安全性、双向认证性,还能有效地抵抗中间人攻击。最后,依赖于Diffie-Hellman(CDH)假设,在随机预言机和理想密码模型下证明了协议的安全性。 相似文献
186.
在城市应急管理中,强化城市的“承灾能力”和“自恢复能力”,有利于完善现代城市治理体系,提升城市治理现代化水平。从“韧性城市”理论的视角,分析传统城市应急管理的方法和措施在事前预测预警能力、事中处置应对能力和事后恢复重建能力上面临的新问题:应急预警能力有待提高、应急处置措施有待改进、协同应对能力有待加强。我们应抓住人工智能时代科技发展的新机遇,努力做到智能化的预测预警及应急响应,全过程的实时感知及趋势分析,多方面的协同应对与恢复重建,以提高城市应急管理的智能化水平和抵御各种灾害的能力。 相似文献
187.
This article presents an asset‐level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast‐resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life‐cycle cost considering a 10‐year service period. 相似文献
188.
Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity. 相似文献
189.
In this article, a classification model based on the majority rule sorting (MR‐Sort) method is employed to evaluate the vulnerability of safety‐critical systems with respect to malevolent intentional acts. The model is built on the basis of a (limited‐size) set of data representing (a priori known) vulnerability classification examples. The empirical construction of the classification model introduces a source of uncertainty into the vulnerability analysis process: a quantitative assessment of the performance of the classification model (in terms of accuracy and confidence in the assignments) is thus in order. Three different app oaches are here considered to this aim: (i) a model–retrieval‐based approach, (ii) the bootstrap method, and (iii) the leave‐one‐out cross‐validation technique. The analyses are presented with reference to an exemplificative case study involving the vulnerability assessment of nuclear power plants. 相似文献
190.
Yunxia Zhu Subodha Kumar Sara Rodriguez‐Sanchez Chelliah Sriskandarajah 《Production and Operations Management》2015,24(12):1966-1983
We study the logistics problem faced by Regional Branches (RBs) of a central bank in managing the currency supply under security concerns. While making banknote supply decisions to Sub‐Branches (SBs), the management of RB must achieve two goals simultaneously: (i) guarantee that each SB has sufficient inventories of all denominations of banknotes to satisfy the demands from all commercial banks within its service area, and (ii) control the annual spending on this banknote supply operation. Due to security concerns, the following methods are implemented in the process of transporting banknotes: (i) the capacity of a cash truck is limited by the total face value (instead of the physical space) of banknotes, and (ii) empty decoy trucks are deployed along with the trucks filled with banknotes. After deriving a polynomial‐time strategy to guarantee an optimal solution for the special Bin‐Packing Problem faced in this study, we provide an exact formulation for the RB's supply planning problem. We also propose several polynomial‐time algorithms for deriving either optimal or near‐optimal solutions for the problem under different settings. Using the weekly demand data obtained from the central bank, we verify the performance of our algorithms, and analyze the impacts of changes in these features and in the fleet capacity on the total cost incurred by an RB under various scenarios. 相似文献