首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   632篇
  免费   20篇
  国内免费   5篇
管理学   37篇
民族学   10篇
人口学   6篇
丛书文集   74篇
理论方法论   17篇
综合类   488篇
社会学   24篇
统计学   1篇
  2024年   1篇
  2023年   6篇
  2022年   5篇
  2021年   6篇
  2020年   8篇
  2019年   15篇
  2018年   3篇
  2017年   4篇
  2016年   12篇
  2015年   15篇
  2014年   31篇
  2013年   31篇
  2012年   51篇
  2011年   62篇
  2010年   56篇
  2009年   51篇
  2008年   35篇
  2007年   57篇
  2006年   56篇
  2005年   29篇
  2004年   27篇
  2003年   27篇
  2002年   22篇
  2001年   17篇
  2000年   16篇
  1999年   2篇
  1998年   2篇
  1997年   2篇
  1996年   2篇
  1994年   2篇
  1993年   1篇
  1992年   2篇
  1985年   1篇
排序方式: 共有657条查询结果,搜索用时 31 毫秒
1.
寨堡是我国古代重要的军事防御性聚落,其修筑的时间、空间皆与区域的战争形势有着较大关系。清代四川省由于多次大规模战乱,迫使乡民修筑了数以千计的寨堡。寨堡的命名主要可分为因自然地理条件和因人文社会因素两大类,前者包括地形、水文、土石、植物等,后者包括姓氏、寺观、神祇、嘉名、人物、神话、形象、纪事等。寨名包含了丰富的文化内涵,体现出了寨堡的选址、用材、作用、历史、精神等内容。  相似文献   
2.
《Long Range Planning》2019,52(3):366-385
The ambidexterity framework, which comprises two contradictory, yet interrelated processes of exploration and exploitation, has been researched using a variety of perspectives. Few studies, however, provide insight into the question: how is ambidexterity managed across multiple organizational levels? To address this question, we introduce the term ambidexterity penetration that refers to the enactment of ambidexterity across multiple organizational levels and develop a conceptual framework about how it is practiced (horizontally, vertically and organizationally). We empirically showcase this framework using findings from six business units of an aerospace and defense organization and analyzing data from 30 interviews. Overall, our study contributes to ambidexterity research and offers an empirical investigation of ambidexterity penetration across multiple organizational levels in the context of the aerospace and defense sector.  相似文献   
3.
文章通过《刑法》第20条第3款关于防卫权的称谓、文字表述、针对的对象范围、整体价值和实质效果的分析,认为该条款无论是在立法上还是在司法实践中均存在重大缺陷,由此提出对该款的修改意见。  相似文献   
4.
Many explanations have been given as to why men batter. Rarely are deep unconscious intrapsychic processes identified as contributing reasons. One way that violent men may use their partner to fill emotional needs is through the primitive defense of projective identification. Projective identification may be invoked by men to induce the other partner to carry split off threatening parts of the self that are too anxiety provoking to retain. The occurrence of projective identification could therefore be an important intrapsychic and interpersonal dynamic that contributes to the escalation of tension prior to the violent episode.  相似文献   
5.
文章通过解读组诗文本,抓住家园情结这一内核,较为翔实地剖析了诗人对农耕民族的精神历程与诗意关怀,并归纳了三个艺术特点即忧患精神的张扬、时空转换的把握和整体象征的艺术自觉.  相似文献   
6.
陈亮的“义利双行”是基于他对“王霸”的认识展开的。他辨析王霸之道的用意在于完善其事功理论,并在“至公”的前提下混同王霸,进而提出“立心之本在于功利”的主张,肯定了利欲的合理性。陈亮与朱熹之间,由王霸之辨到义利之辨,基本上都是围绕着三代、汉唐而展开的,但究其本意,又绝非为古而古,而是想通过历史的得失,探讨立身处世的道理。朱熹崇义绌利,义利不两立。陈亮则以王霸并用为出发点,主张有利方有义,无利则无所谓义,因而义利双行,缺一不可。  相似文献   
7.
基于主动网的SYN攻击防御   总被引:1,自引:0,他引:1  
针对目前传统网防御TCP同步泛滥攻击的服务器主机、路由器过滤、防火墙方法的局限性,利用主动网的动态特性,提出一种基于主动网的同步泛滥防御机制,并通过仿真实验将它与传统网环境下的防火墙防御进行了性能比较和分析,结果表明主动网技术为同步泛滥攻击提供了良好的防御性能。  相似文献   
8.
犯罪构成的阶层性或平面性。不能决定“法庭话语权的平衡”和刑法的人权保障机能。犯罪构成模式能够设置一定的诉讼规则,体现一定的诉讼职能和目标。大陆法系阶层递进式犯罪构成模式,设置的是普通法系的可废除诉讼规则。由于缺乏程序要件的保障,虽然有利于提高司法效率。却有损司法公平,不利于人权保障,不值得借鉴。  相似文献   
9.
全面贯彻党的教育方针,坚持育人为本、德育为先,实施素质教育,提高教育现代化水平,培养德智体美全面发展的社会主义建设者和可靠接班人,办好人民满意的教育,是发展高等职业教育,实施科教兴国战略的目标。从提高学生素质,促进现代化建设的高度出发,对高职院校开展国防教育的意义、目的、时间、方式和方法等进行探讨,有益于高职院校学生的全面发展。  相似文献   
10.
This article presents a framework for using probabilistic terrorism risk modeling in regulatory analysis. We demonstrate the framework with an example application involving a regulation under consideration, the Western Hemisphere Travel Initiative for the Land Environment, (WHTI‐L). First, we estimate annualized loss from terrorist attacks with the Risk Management Solutions (RMS) Probabilistic Terrorism Model. We then estimate the critical risk reduction, which is the risk‐reducing effectiveness of WHTI‐L needed for its benefit, in terms of reduced terrorism loss in the United States, to exceed its cost. Our analysis indicates that the critical risk reduction depends strongly not only on uncertainties in the terrorism risk level, but also on uncertainty in the cost of regulation and how casualties are monetized. For a terrorism risk level based on the RMS standard risk estimate, the baseline regulatory cost estimate for WHTI‐L, and a range of casualty cost estimates based on the willingness‐to‐pay approach, our estimate for the expected annualized loss from terrorism ranges from $2.7 billion to $5.2 billion. For this range in annualized loss, the critical risk reduction for WHTI‐L ranges from 7% to 13%. Basing results on a lower risk level that results in halving the annualized terrorism loss would double the critical risk reduction (14–26%), and basing the results on a higher risk level that results in a doubling of the annualized terrorism loss would cut the critical risk reduction in half (3.5–6.6%). Ideally, decisions about terrorism security regulations and policies would be informed by true benefit‐cost analyses in which the estimated benefits are compared to costs. Such analyses for terrorism security efforts face substantial impediments stemming from the great uncertainty in the terrorist threat and the very low recurrence interval for large attacks. Several approaches can be used to estimate how a terrorism security program or regulation reduces the distribution of risks it is intended to manage. But, continued research to develop additional tools and data is necessary to support application of these approaches. These include refinement of models and simulations, engagement of subject matter experts, implementation of program evaluation, and estimating the costs of casualties from terrorism events.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号