首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   66篇
  免费   1篇
管理学   3篇
民族学   3篇
人口学   8篇
理论方法论   7篇
社会学   7篇
统计学   39篇
  2023年   2篇
  2021年   2篇
  2020年   1篇
  2019年   5篇
  2018年   5篇
  2017年   5篇
  2016年   6篇
  2015年   3篇
  2014年   5篇
  2013年   13篇
  2012年   4篇
  2011年   3篇
  2009年   1篇
  2008年   1篇
  2007年   3篇
  2006年   2篇
  2004年   1篇
  2003年   1篇
  2002年   1篇
  2001年   1篇
  1991年   1篇
  1989年   1篇
排序方式: 共有67条查询结果,搜索用时 15 毫秒
1.
Muslims constitute 2.2% of the Australian population. Given the current socio-political climate and the limited research, the present exploratory study explores the relationship between acculturation, ethnic identity, self-identity, generational status, religiosity, and demographics among adult Australian Muslims.

A cross-sectional convenience sample of 324 adult Australian Muslims completed either online or paper-based questionnaires in either English or Arabic. Recruitment was via convenience sampling and social media advertisements. Acculturation, ethnic identity (MEIM), religiosity, and demographic variables were measured.

The study sample was young and mostly female, with high religiosity levels. Acculturation was negatively correlated with ethnic identity. From multiple regression analysis, acculturation was predicted independently by religiosity (low), age (young), gender (male) and ethnic identity (low).

First generation Australian Muslims were older, had stronger ethnic identity and religiosity, and more commonly self-identified as non-Australian. By contrast second- and third-generation were more likely to self-identify as bicultural or Australian.

In summary, acculturation of Australian Muslims is influenced by multiple variables, particularly ethnic identity, religiosity, and generation; hence all these variables need to be included in policy regarding successful integration of migrants.  相似文献   

2.
In this commentary, we argue that plagiarism is not a new problem in academic publishing and data falsification in recent times has received a great attention globally. Due to lack of literature, the objective of this study is to evaluate data falsification and academic integrity. Accordingly, the study presents the academic misconduct (Falsification/Fabrication of data and Concerns/Issues About Data) case of Professor James E. Hunton, a former top ranked accounting professor from Bentley University. The study shows how research fraud/data falsification activity in the academic world lacks honesty and morality. The study offers some recommendations for the detection of plagiarism and academic misconduct. In the age of the Internet and digital era, Crossref, iThenticate, the Committee on Publication Ethics (COPE) would help to detect plagiarism. However, the question remains on detecting data falsification in the academic world.  相似文献   
3.
Population and Environment - This analysis examines whether salinity in drinking water is associated with pre-eclampsia and eclampsia (PE/E), a leading cause of maternal morbidity and mortality....  相似文献   
4.
Understanding the complexity of identity in the children of immigrants has become important with the growing rates of global migration. A new theoretical construct refers to an individual’s subjective representation of the interrelationships among his or her multiple group identities and how their subjective identity could be explained.

The aim of this study was to examine the impact of their Iranian background and the social characteristics of their host society, Australia, on the second generation’s understanding of their national and ethnic identity.

This cross-sectional study is based on a quantitative method. Participants in the study were second-generation Iranians aged 18–40, living in Australia. Data were collected on how these second-generation Iranians identified themselves with Iranian society and/or with the wider society, and how their chosen identity was influenced by their background, their national beliefs, their perspectives towards the host country and the host country’s perspective towards specific ethnic groups.

Overall, 137 people participated in this study, and the results show patterns of biculturalism; the majority claimed hyphenated identity wherein the second identity was shown to be the weaker identity. The main contextual factors influencing their identity formation were birth place, acculturation and attitudes towards the host.  相似文献   

5.
Control charts have been popularly used as a user-friendly yet technically sophisticated tool to monitor whether a process is in statistical control or not. These charts are basically constructed under the normality assumption. But in many practical situations in real life this normality assumption may be violated. One such non-normal situation is to monitor the process variability from a skewed parent distribution where we propose the use of a Maxwell control chart. We introduce a pivotal quantity for the scale parameter of the Maxwell distribution which follows a gamma distribution. Probability limits and L-sigma limits are studied along with performance measure based on average run length and power curve. To avoid the complexity of future calculations for practitioners, factors for constructing control chart for monitoring the Maxwell parameter are given for different sample sizes and for different false alarm rate. We also provide simulated data to illustrate the Maxwell control chart. Finally, a real life example has been given to show the importance of such a control chart.  相似文献   
6.
This paper offers an analysis of crime in the Palestinian society in Israel from the perspective of political relationships. It illustrates that the state of Israel is trying to define and identify crime through ideologies and narrow interests. This process is part of a mechanism of control, which intends to criminalize the daily life of the Palestinians. Discriminatory behavior against Arabs by police is more apparent and the records on crime are sometimes inaccessible, with a mania for secrecy, and view the whole Arab community as a security danger. The Israeli social control policy politicizes this community, with excess control in some areas and a lack of control in others. The paper concludes that no detailed arguments are needed in order to see the ineffectiveness of the Israeli control policy as long as the basic root of the political struggle is not answered.  相似文献   
7.
Empirical Bayes estimator for the transition probability matrix is worked out in the cases where we have belief regarding the parameters, For example, where the states seem to be equal or not. In both cases, priors are in accordance with our beliefs. Using EM algorithm, computational methods for different hyperparameters of the empirical Bayes are described. Also, robustness of empirical Bayes procedure is investigated.  相似文献   
8.
Bayesian hierarchical models typically involve specifying prior distributions for one or more variance components. This is rather removed from the observed data, so specification based on expert knowledge can be difficult. While there are suggestions for “default” priors in the literature, often a conditionally conjugate inverse‐gamma specification is used, despite documented drawbacks of this choice. The authors suggest “conservative” prior distributions for variance components, which deliberately give more weight to smaller values. These are appropriate for investigators who are skeptical about the presence of variability in the second‐stage parameters (random effects) and want to particularly guard against inferring more structure than is really present. The suggested priors readily adapt to various hierarchical modelling settings, such as fitting smooth curves, modelling spatial variation and combining data from multiple sites.  相似文献   
9.
A large number of statistics are used in the literature to detect outliers and influential observations in the linear regression model. In this paper comparison studies have been made for determining a statistic which performs better than the other. This includes: (i) a detailed simulation study, and (ii) analyses of several data sets studied by different authors. Different choices of the design matrix of regression model are considered. Design A studies the performance of the various statistics for detecting the scale shift type outliers, and designs B and C provide information on the performance of the statistics for identifying the influential observations. We have used cutoff points using the exact distributions and Bonferroni's inequality for each statistic. The results show that the studentized residual which is used for detection of mean shift outliers is appropriate for detection of scale shift outliers also, and the Welsch's statistic and the Cook's distance are appropriate for detection of influential observations.  相似文献   
10.
Log-location-scale distributions are widely used parametric models that have fundamental importance in both parametric and semiparametric frameworks. The likelihood equations based on a Type II censored sample from location-scale distributions do not provide explicit solutions for the para-meters. Statistical software is widely available and is based on iterative methods (such as, Newton Raphson Algorithm, EM algorithm etc.), which require starting values near the global maximum. There are also many situations that the specialized software does not handle. This paper provides a method for determining explicit estimators for the location and scale parameters by approximating the likelihood function, where the method does not require any starting values. The performance of the proposed approximate method for the Weibull distribution and Log-Logistic distributions is compared with those based on iterative methods through the use of simulation studies for a wide range of sample size and Type II censoring schemes. Here we also examine the probability coverages of the pivotal quantities based on asymptotic normality. In addition, two examples are given.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号