首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6003篇
  免费   1022篇
  国内免费   41篇
管理学   1820篇
民族学   16篇
人口学   77篇
丛书文集   125篇
理论方法论   979篇
综合类   1078篇
社会学   1843篇
统计学   1128篇
  2024年   3篇
  2023年   24篇
  2022年   22篇
  2021年   138篇
  2020年   217篇
  2019年   381篇
  2018年   254篇
  2017年   416篇
  2016年   406篇
  2015年   417篇
  2014年   458篇
  2013年   746篇
  2012年   476篇
  2011年   380篇
  2010年   332篇
  2009年   271篇
  2008年   315篇
  2007年   214篇
  2006年   246篇
  2005年   240篇
  2004年   224篇
  2003年   169篇
  2002年   201篇
  2001年   167篇
  2000年   133篇
  1999年   35篇
  1998年   25篇
  1997年   21篇
  1996年   19篇
  1995年   14篇
  1994年   14篇
  1993年   19篇
  1992年   7篇
  1991年   11篇
  1990年   9篇
  1989年   8篇
  1988年   15篇
  1987年   1篇
  1986年   3篇
  1985年   5篇
  1984年   3篇
  1983年   3篇
  1981年   4篇
排序方式: 共有7066条查询结果,搜索用时 140 毫秒
111.
Research shows that top‐down‐designed parenting programmes do not always meet the needs of postmigration parents. Bottom‐up programmes by migrant organizations hold a promise to fill this gap; however, research about these programmes and appropriate evaluation methodologies is scarce. Drawing upon Wenger's ( 2010 ) “communities of practice,” this paper explores an alternative perspective on parenting programme evaluation. Findings are presented from a study looking into social learning processes of postmigration parents who participated in a bottom‐up programme about raising teenagers in urban areas. Using an ethnographically inspired method combined with a preprogramme and postprogramme design, 115 Moroccan‐Dutch mothers and fathers from 15 programme groups participated. Results show that the programme provided a social learning space in which parents used themselves as resources to learn collectively about parenting. Moreover, parents consciously engaged in learning interactions across learning spaces stretched into their social networks. These analyses showed how parents' development of “learning citizenship” (Wenger, 2009 ) provides us with insight in collective learning dimensions present in a bottom‐up parenting programme, which is often not included in evaluation studies. Implications for practitioners as facilitators of parents' collective learning are presented.  相似文献   
112.
This paper presents a qualitative analysis of front‐line practices regarding emergency removals in Finnish and Irish child protection. It examines how the responses to children's immediate danger are framed by legislation and how front‐line practitioners assess the child's situation and make emergency placement decisions. The data consist of interviews with 16 Irish and 33 Finnish social workers. These child welfare protection systems respond differently to a task that appears to be similar. The Irish team‐based practice rests on the social workers' shared assessment of the child's needs, and the formal decision is made by the courts (or police officers at night‐time); and the Finnish practice involves only one single social worker who makes both the assessment and the removal decision. The Irish system is tightly time regulated, whereas the Finnish system provides a more flexible time frame. Both approaches put a lot of stress on social workers' practice, which also includes creative workarounds (e.g., “planned emergency removals” in Finland). Future research will need to explore these features from the point of view of a child's right to protection.  相似文献   
113.
An extended single‐index model is considered when responses are missing at random. A three‐step estimation procedure is developed to define an estimator for the single‐index parameter vector by a joint estimating equation. The proposed estimator is shown to be asymptotically normal. An algorithm for computing this estimator is proposed. This algorithm only involves one‐dimensional nonparametric smoothers, thereby avoiding the data sparsity problem caused by high model dimensionality. Some simulation studies are conducted to investigate the finite sample performances of the proposed estimators.  相似文献   
114.
Outlier detection algorithms are intimately connected with robust statistics that down‐weight some observations to zero. We define a number of outlier detection algorithms related to the Huber‐skip and least trimmed squares estimators, including the one‐step Huber‐skip estimator and the forward search. Next, we review a recently developed asymptotic theory of these. Finally, we analyse the gauge, the fraction of wrongly detected outliers, for a number of outlier detection algorithms and establish an asymptotic normal and a Poisson theory for the gauge.  相似文献   
115.
This discussion paper suggests that there is possibly a divergence of opinion taking place within the field of child and family social work and that the stated positions are influencing how practitioners identify and deal with risks and opportunities afforded by the Internet and social media. The suggested divergence is examined and the conclusion drawn is that what is taking place mirrors the fact that the introduction of any new technology inevitably brings with it division and debate. In seeking to understand the reaction to digital technology, consideration is given to a series of wider social discourses on childhood and risk, which includes the controversial notion that the profession is a harbinger of moral panic and that the management of risk has been broadened from child protection to child safety. The discussion paper concludes by calling for child and family social work practitioners to have a balanced debate that needs to be informed not only by current research but also by an open and honest discussion about personal use and an acknowledgement that there will be difficult moral and ethical questions to work through.  相似文献   
116.
We consider resource allocation problems where inputs are allocated to different entities such as activities, projects or departments. In such problems a common goal is achieving a desired balance in the allocation over different categories of the entities. We propose a bi-criteria framework for trading balance off against efficiency. We define and categorise indicators based on balance distribution and propose formulations and solution algorithms which provide insight into the balance-efficiency tradeoff. We illustrate our models by applying them to the data of a portfolio selection problem faced by a science funding agency and to randomly generated large-sized problem instances to demonstrate computational feasibility.  相似文献   
117.
Dr. Yellman proposes to define frequency as “a time‐rate of events of a specified type over a particular time interval.” We review why no definition of frequency, including this one, can satisfy both of two conditions: (1) the definition should agree with the ordinary meaning of frequency, such as that less frequent events are less likely to occur than more frequent events, over any particular time interval for which the frequencies of both are defined; and (2) the definition should be applicable not only to exponentially distributed times between (or until) events, but also to some nonexponential (e.g., uniformly distributed) times. We make the simple point that no definition can satisfy (1) and (2) by showing that any definition that determines which of any two uniformly distributed times has the higher “frequency” (or that determines that they have the same “frequency,” if neither is higher) must assign a higher frequency number to the distribution with the lower probability of occurrence over some time intervals. Dr. Yellman's proposed phrase, “time‐rate of events … over a particular time interval” is profoundly ambiguous in such cases, as the instantaneous failure rates vary over an infinitely wide range (e.g., from one to infinity), making it unclear which value is denoted by the phrase “time‐rate of events.”  相似文献   
118.
Security of infrastructure is a major concern. Traditional security schedules are unable to provide omnipresent coverage; consequently, adversaries can exploit predictable vulnerabilities to their advantage. Randomized security schedules, which randomly deploy security measures, overcome these limitations, but public perceptions of such schedules have not been examined. In this experiment, participants were asked to make a choice between attending a venue that employed a traditional (i.e., search everyone) or a random (i.e., a probability of being searched) security schedule. The absolute probability of detecting contraband was manipulated (i.e., 1/10, 1/4, 1/2) but equivalent between the two schedule types. In general, participants were indifferent to either security schedule, regardless of the probability of detection. The randomized schedule was deemed more convenient, but the traditional schedule was considered fairer and safer. There were no differences between traditional and random schedule in terms of perceived effectiveness or deterrence. Policy implications for the implementation and utilization of randomized schedules are discussed.  相似文献   
119.
This study used the social cognitive theory of well‐being (SCTW; Lent, 2004 ) to examine the role of career decision self‐efficacy (CDSE), perceived educational barriers, and independent self‐construal on the life satisfaction of 176 Mexican American college women. A 3‐step hierarchical regression analysis indicated that independent self‐construal, CDSE, and fewer perceived educational barriers significantly predicted greater life satisfaction among Mexican American college women above and beyond the influence of socioeconomic status and generational status. These findings are consistent with SCTW and highlight the need for counselors and researchers to be aware of the role that self‐construal, CDSE, and perceived educational barriers can have on Mexican American women's life satisfaction. Implications for practice at the secondary‐school and university levels are discussed.  相似文献   
120.
The cost of an uncontrolled incursion of invasive alien species (IAS) arising from undetected entry through ports can be substantial, and knowledge of port‐specific risks is needed to help allocate limited surveillance resources. Quantifying the establishment likelihood of such an incursion requires quantifying the ability of a species to enter, establish, and spread. Estimation of the approach rate of IAS into ports provides a measure of likelihood of entry. Data on the approach rate of IAS are typically sparse, and the combinations of risk factors relating to country of origin and port of arrival diverse. This presents challenges to making formal statistical inference on establishment likelihood. Here we demonstrate how these challenges can be overcome with judicious use of mixed‐effects models when estimating the incursion likelihood into Australia of the European (Apis mellifera) and Asian (A. cerana) honeybees, along with the invasive parasites of biosecurity concern they host (e.g., Varroa destructor). Our results demonstrate how skewed the establishment likelihood is, with one‐tenth of the ports accounting for 80% or more of the likelihood for both species. These results have been utilized by biosecurity agencies in the allocation of resources to the surveillance of maritime ports.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号