首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4444篇
  免费   123篇
  国内免费   55篇
财政金融   263篇
工业经济   174篇
计划管理   813篇
经济学   717篇
综合类   653篇
运输经济   21篇
旅游经济   67篇
贸易经济   472篇
农业经济   836篇
经济概况   605篇
信息产业经济   1篇
  2024年   18篇
  2023年   63篇
  2022年   68篇
  2021年   99篇
  2020年   154篇
  2019年   88篇
  2018年   93篇
  2017年   106篇
  2016年   89篇
  2015年   132篇
  2014年   302篇
  2013年   283篇
  2012年   331篇
  2011年   396篇
  2010年   338篇
  2009年   287篇
  2008年   335篇
  2007年   328篇
  2006年   276篇
  2005年   211篇
  2004年   174篇
  2003年   146篇
  2002年   72篇
  2001年   75篇
  2000年   58篇
  1999年   26篇
  1998年   9篇
  1997年   4篇
  1996年   16篇
  1995年   5篇
  1994年   7篇
  1993年   4篇
  1992年   4篇
  1991年   10篇
  1990年   4篇
  1989年   5篇
  1988年   3篇
  1985年   1篇
  1984年   2篇
排序方式: 共有4622条查询结果,搜索用时 12 毫秒
101.
吴紫苑  骆小婷 《价值工程》2013,(26):287-288
现在高职学生民主化管理进程不断加快,有关学校管理方面的体制正面临着严峻挑战,学校管理体制由集权走向分权的趋势,由集中走向民主,由控制走向服务。现在的高职学校管理中,学生作为主体没有得到彰显,仅是被作为管理活动的接受者,学校管理还是为学校行政人员和教师的两种权力把持,学生参与学校管理权力被遮蔽。该文章从学生参与学校管理权力的现状、看法、意愿等方面进行了调查和分析,得出了一些有意义的结论。  相似文献   
102.
Market surveillance systems have increasingly gained in usage for monitoring trading activities in stock markets to maintain market integrity. Existing systems primarily focus on the numerical analysis of market activity data and generally ignore textual information. To fulfil the requirements of information-based surveillance, a multi-agent-based architecture that uses agent intercommunication and incremental learning mechanisms is proposed to provide a flexible and adaptive inspection process. A prototype system is implemented using the techniques of text mining and rule-based reasoning, among others. Based on experiments in the scalping surveillance scenario, the system can identify target information evidence up to 87.50% of the time and automatically identify 70.59% of cases depending on the constraints on the available information sources. The results of this study indicate that the proposed information surveillance system is effective. This study thus contributes to the market surveillance literature and has significant practical implications.  相似文献   
103.
This research proposes a novel method of identifying and understanding the holistic overview of emerging technologies’ unintended consequences. Latent Semantic Analysis (LSA) text mining technique is employed to yield multiple groups of contextually similar terms from future-oriented data sources, comprising both experts’ and the public's concerns regarding future technologies. Resulting term clusters are considered as new abstractions, or so-called scenarios, of future social impacts. Furthermore, the study acquires greater depth and breadth in conceptualizing social impacts through considering condition- and value-related terms as key linking factors to previous social impact-related literature. Our proposed methodology seeks to gain insights into the utilization of future-oriented data sources for the foresight activity, hoping to mitigate public skepticism and pursue a better social acceptance of emerging technologies.  相似文献   
104.
根据刘店矿10煤层首采工作面底板岩层为高阻电性层的特点,采用电测深法进行探测,探测结果显示存在4个视电阻率低阻异常条带区,把其中幅值和范围相对较大、富水性和突水危险性较强的异常区作为重点防治水区。根据电测和钻探探查结论对1044工作面底板进行防治水工作,总结提出了物探先行、疏水降压与底板加固相结合的综合防治水途径。  相似文献   
105.
随着科技的发展,数字矿山建设正在被越来越多的人们所关注。利用计算机科学、矿山地质和图形学等多学科多种技术,对矿山开采前期和采矿等多个环节,进行数据的采集、处理、分析以及对矿井生产进行虚拟现实模拟,以实现矿山安全高效开采,是现代化矿井建设的必由之路,而建立指导矿井生产的各类三维图形则是基础环节。在采矿工程本科教学中,如能构建三维图形库具有针对性地培养学生,为企业培养综合素质强,多技能的应用型人才,具有重要意义。  相似文献   
106.
This paper studies the willingness to pay (WTP) for forest property rights in Viet Nam. We do so by asking respondents to estimate the value of two different forest property rights regimes where only the level of property security differs and all other forest plot characteristics are constant. We use this information to identify the value of the property rights security. Our results reveal that a significant number of individuals are willing to pay for an additional area of forestland but that the amount offered appears to be inadequate to compensate sellers, as very few land market transactions actually take place. The results further indicate that income relates positively to WTP, irrespective of forest property regime. Wealth, age, and ethnicity also have an impact on the amount households are willing to pay. As expected, there was a significant mark-up on the more secure right. Econometric estimates of the difference between the WTP for secure and insecure property rights show that a higher level of female education, and household age decrease the difference between the two WTP measures while the difference tends to increase as income improves. This has important policy implications, as it indicates that households tend to evaluate the property rights institutions differently.  相似文献   
107.
W. Xu  S.E. Lowe  S. Zhang 《Applied economics》2013,45(22):2639-2652
This article measures irrigated agricultural outcomes under the prior appropriation doctrine by developing a model of farmers’ land allocations in response to water supply change. The modelling approach considers the institutional factors of water rights and permits the inclusive determination of water and land allocations. We utilize farm-level data of irrigated agriculture in Water District #1 in Idaho to examine the predictions from our theoretical model. The water rights priority date is consolidated at the farm level and used to differentiate farmers’ responses. We test a set of hypotheses that relate to water supply and crop revenue. Our results suggest that the water rights priority has a profound impact on agricultural outcomes, indicating strong institutional effects and weak influence of market-based approaches. Farmers respond to both long-term and seasonal water supply change and variation, and they respond to seasonal water supply forecasts in varied ways depending on their water rights portfolios, thus signalling a disproportionate distribution of potential impacts of water supply change.  相似文献   
108.
There has been a recent resurgence of interest in debates about the power of business (Culpepper 2011 Culpepper, P. (2011). Quiet Politics and Business Power: Corporate Control in Europe and Japan, Cambridge: Cambridge University Press. [Google Scholar]; Bell 2012 Bell, S. (2012). The Power of Ideas: The Ideational Mediation of the Structural Power of Business. International Studies Quarterly, 56(4), 66173. doi: 10.1111/j.1468-2478.2012.00743.x[Crossref], [Web of Science ®] [Google Scholar]) and Bell and Hindmoor (2013 Bell, S., Hindmoor, A. (2013). The Structural Power of Business and the Power of Ideas: The Strange Case of the Australian Mining Tax. New Political Economy, ,forthcoming. Available from: http://dx.doi.org/10.1080/13563467.2013.796452 [19 (3), pp. 470–486, cross-references updated] [Google Scholar]) make an important, theoretically informed, but empirically rooted, contribution to that debate. In this response, we address both aspects of their contribution, arguing that their treatment of Lindblom is partial and, consequently, so is their explanation of the case. As such, we largely rely on their narrative of the evolution of the Australian mining tax, focusing first on critically examining Bell and Hindmoor's theoretical position, before turning to their analysis of the case.  相似文献   
109.
The computational complexity, huge memory space requirement, and time-consuming nature of frequent pattern mining process are the most important motivations for distribution and parallelization of this mining process. On the other hand, the emergence of distributed computational and operational environments, which causes the production and maintenance of data on different distributed data sources, makes the parallelization and distribution of the knowledge discovery process inevitable. In this paper, a gossip based distributed itemset mining (GDIM) algorithm is proposed to extract frequent itemsets, which are special types of frequent patterns, in a wireless sensor network environment. In this algorithm, local frequent itemsets of each sensor are extracted using a bit-wise horizontal approach (LHPM) from the nodes which are clustered using a leach-based protocol. Heads of clusters exploit a gossip based protocol in order to communicate each other to find the patterns which their global support is equal to or more than the specified support threshold. Experimental results show that the proposed algorithm outperforms the best existing gossip based algorithm in term of execution time.  相似文献   
110.
十六大报告提出:“要尊重和保护一切有益于人民和社会的劳动”,对这一论断要从时代的高度进行深入认识。尊重劳动,要尊重一切有益于人民和社会的劳动,要实行按劳动创值贡献分配薪酬体系,要切实保护劳动者的权益。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号