首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4815篇
  免费   230篇
  国内免费   40篇
管理学   1090篇
劳动科学   3篇
民族学   54篇
人才学   1篇
人口学   81篇
丛书文集   317篇
理论方法论   356篇
综合类   2215篇
社会学   782篇
统计学   186篇
  2024年   6篇
  2023年   59篇
  2022年   31篇
  2021年   54篇
  2020年   112篇
  2019年   112篇
  2018年   124篇
  2017年   132篇
  2016年   114篇
  2015年   106篇
  2014年   284篇
  2013年   606篇
  2012年   247篇
  2011年   362篇
  2010年   252篇
  2009年   273篇
  2008年   267篇
  2007年   284篇
  2006年   277篇
  2005年   209篇
  2004年   211篇
  2003年   169篇
  2002年   181篇
  2001年   101篇
  2000年   89篇
  1999年   65篇
  1998年   34篇
  1997年   34篇
  1996年   20篇
  1995年   18篇
  1994年   33篇
  1993年   13篇
  1992年   20篇
  1991年   14篇
  1990年   12篇
  1989年   11篇
  1988年   19篇
  1987年   7篇
  1986年   10篇
  1985年   12篇
  1984年   23篇
  1983年   15篇
  1982年   15篇
  1981年   20篇
  1980年   9篇
  1979年   4篇
  1978年   14篇
  1977年   1篇
排序方式: 共有5085条查询结果,搜索用时 15 毫秒
71.
受家庭养老功能弱化的影响,学界对老年人养老方式的研究与探讨也日益丰富和激烈,机构养老对于弥补家庭养老功能弱化的重要性日益凸显;当前学界对社会化机构养老的研究涉及面甚广,但缺乏不同学科视角下宏观层面的概括研究以及对新模式发展的探讨,通过将已有研究以社会学、经济学、管理学及近年兴起的老年学为视角进行归类梳理,厘清不同视角的...  相似文献   
72.
A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information‐based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions.  相似文献   
73.
杜文倩 《学术探索》2012,(2):143-145
随着互联网的普及,现在中国已经进入了网络时代,现在的人们以及各行各业都离不开网络,它与人们的生活息息相关,尤其现在的年轻人,网络已经成为他们生活中不可缺少的一部分。由于网络的及时性,更多的人已经开始习惯于从网络上获取信息。除了从网络上获取信息,人们还可以在网上交友,信息分享和进行其他的网络活动。网络活动的增多,网络语言也开始繁荣起来。为了适应网络的特殊环境,网络语言在汉语言的词汇、语法、发音和构成上都发生了很大的变异。本文将对网络语言的产生、发展以及网络语言对汉语言产生的影响进行分析。  相似文献   
74.
Legislation within England states that local authorities should provide services for all those families in need. However, research has identified that regardless of the introduction of strategies to identify need and enhance family support, ongoing barriers to services adhere. Taking a social constructionist approach, this study explored professionals' experiences of the use of the Common Assessment Framework form. Data were collected in four different local authorities in two phases. Forty‐one professionals from a variety of agencies took part in semi‐structured interviews. Data were analyzed thematically. Findings demonstrate that the professionals experienced difficulties in working through the Common Assessment Framework process, for example, in completing the form and engaging families. This situation led to the more experienced and knowledgeable professionals utilising creative ways to successfully navigate the ‘referral process’. Such creative working practices included the terminology used to complete the form and how the process was ‘sold’ to parents, so that they could be in a better position to engage parents and complete the Common Assessment Framework form. Because of this, more experienced professionals seem to be able to accelerate the referral process in order to access much needed support services for children and young people.  相似文献   
75.
经典的绘画作品感染并打动观众,是通过视觉这一感官体验来完成的。因此,在今天展览越来越多、展厅越来越大的情况下,有一些人从简单的视觉体验出发,使“视觉冲击力”这一曾经只运用于设计领域的词汇,在绘画中泛滥,进而波及工笔画领域。文章根据中国传统工笔画的品评标准,结合现代工笔画的绘画创作实践,分析视觉冲击力与经典的工笔画之间的矛盾与联系:经典的工笔画具有一定的视觉冲击,但是具有“视觉冲击力”的工笔画不一定就是经典的画作,真正的经典作品必须具有崇高的审美本质,在经过岁月的检验后,才能焕发出像珍珠一样夺目的光彩。  相似文献   
76.
Therapeutic Assessment with Children (TA‐C) is a brief semi‐structured intervention in which psychological assessment is used to help families with children and adolescents to change. In this paper we introduce the TA‐C model, describe its semi‐structured format and exemplify how it can be applied by family therapists.  相似文献   
77.
学界对改革开放以来中共三代领导集体核心——邓小平、江泽民、胡锦涛法律思想的研究主要集中在对其历史地位、历史意义、基本内容、基本特征及形成过程的概括和总结上,对三者的相互关系、它们对中国法制建设的影响及三者在中国特色社会主义法制思想形成过程中所做出的历史贡献缺乏整体性研究,需要今后进一步深入探讨。  相似文献   
78.
位于中国最西部的喀什具有悠久的城市历史、伊斯兰历史、多宗教交流史、多文化融通史,这就使得喀什文化成为民族特色鲜明同时兼容多种他者文化元素的典范.与此同时,在喀什城市发展史上,体现出鲜明的文化改造、创新的变动过程.这些决定了对喀什城市的研究必须要有开放的视野和充分语境化的意识,要对现今有关研究存在的诸问题有清晰的认识.  相似文献   
79.
80.
Land subsidence risk assessment (LSRA) is a multi‐attribute decision analysis (MADA) problem and is often characterized by both quantitative and qualitative attributes with various types of uncertainty. Therefore, the problem needs to be modeled and analyzed using methods that can handle uncertainty. In this article, we propose an integrated assessment model based on the evidential reasoning (ER) algorithm and fuzzy set theory. The assessment model is structured as a hierarchical framework that regards land subsidence risk as a composite of two key factors: hazard and vulnerability. These factors can be described by a set of basic indicators defined by assessment grades with attributes for transforming both numerical data and subjective judgments into a belief structure. The factor‐level attributes of hazard and vulnerability are combined using the ER algorithm, which is based on the information from a belief structure calculated by the Dempster‐Shafer (D‐S) theory, and a distributed fuzzy belief structure calculated by fuzzy set theory. The results from the combined algorithms yield distributed assessment grade matrices. The application of the model to the Xixi‐Chengnan area, China, illustrates its usefulness and validity for LSRA. The model utilizes a combination of all types of evidence, including all assessment information—quantitative or qualitative, complete or incomplete, and precise or imprecise—to provide assessment grades that define risk assessment on the basis of hazard and vulnerability. The results will enable risk managers to apply different risk prevention measures and mitigation planning based on the calculated risk states.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号