首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12927篇
  免费   172篇
  国内免费   8篇
教育   8914篇
科学研究   1334篇
各国文化   356篇
体育   1160篇
综合类   6篇
文化理论   138篇
信息传播   1199篇
  2022年   125篇
  2021年   179篇
  2020年   266篇
  2019年   411篇
  2018年   500篇
  2017年   528篇
  2016年   435篇
  2015年   301篇
  2014年   324篇
  2013年   2363篇
  2012年   339篇
  2011年   294篇
  2010年   262篇
  2009年   257篇
  2008年   309篇
  2007年   285篇
  2006年   248篇
  2005年   223篇
  2004年   227篇
  2003年   179篇
  2002年   155篇
  2001年   181篇
  2000年   202篇
  1999年   186篇
  1998年   115篇
  1997年   102篇
  1996年   108篇
  1995年   89篇
  1994年   92篇
  1993年   104篇
  1992年   148篇
  1991年   168篇
  1990年   163篇
  1989年   173篇
  1988年   139篇
  1987年   132篇
  1986年   122篇
  1985年   161篇
  1984年   136篇
  1983年   127篇
  1982年   108篇
  1981年   87篇
  1980年   95篇
  1979年   148篇
  1978年   96篇
  1977年   95篇
  1976年   86篇
  1975年   86篇
  1974年   94篇
  1973年   85篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
61.
The current state of the Russian Science Citation Index is analyzed. Several areas for its further development identified by long-standing active users, such as data searching, refinement, and storage; current user alerts; data input with the Science Index license; patent information; and the application programming interface (API) are investigated.  相似文献   
62.
Voice assistants are software agents that can interpret human speech and respond via synthesized voices. Apple’s Siri, Amazon’s Alexa, Microsoft’s Cortana, and Google’s Assistant are the most popular voice assistants and are embedded in smartphones or dedicated home speakers. Users can ask their assistants questions, control home automation devices and media playback via voice, and manage other basic tasks such as email, to-do lists, and calendars with verbal commands. This column will explore the basic workings and common features of today’s voice assistants. It will also discuss some of the privacy and security issues inherent to voice assistants and some potential future uses for these devices. As voice assistants become more widely used, librarians will want to be familiar with their operation and perhaps consider them as a means to deliver library services and materials.  相似文献   
63.
Automatic detection of source code plagiarism is an important research field for both the commercial software industry and within the research community. Existing methods of plagiarism detection primarily involve exhaustive pairwise document comparison, which does not scale well for large software collections. To achieve scalability, we approach the problem from an information retrieval (IR) perspective. We retrieve a ranked list of candidate documents in response to a pseudo-query representation constructed from each source code document in the collection. The challenge in source code document retrieval is that the standard bag-of-words (BoW) representation model for such documents is likely to result in many false positives being retrieved, because of the use of identical programming language specific constructs and keywords. To address this problem, we make use of an abstract syntax tree (AST) representation of the source code documents. While the IR approach is efficient, it is essentially unsupervised in nature. To further improve its effectiveness, we apply a supervised classifier (pre-trained with features extracted from sample plagiarized source code pairs) on the top ranked retrieved documents. We report experiments on the SOCO-2014 dataset comprising 12K Java source files with almost 1M lines of code. Our experiments confirm that the AST based approach produces significantly better retrieval effectiveness than a standard BoW representation, i.e., the AST based approach is able to identify a higher number of plagiarized source code documents at top ranks in response to a query source code document. The supervised classifier, trained on features extracted from sample plagiarized source code pairs, is shown to effectively filter and thus further improve the ranked list of retrieved candidate plagiarized documents.  相似文献   
64.
Libraries have been the key to preserving culture and historic legacy for centuries. One such treasure cataloged in The Pennsylvania State University (Penn State) Libraries is a collection of over 33,000 Sanborn? Fire Insurance Maps. Originally kept safe in metal drawers, the library has embarked on a journey to digitize this abundance of information, combine it with other media such as photographs, and make it accessible through a web interface. Inspired by these efforts, we accessed this information and took it to the next level. Using state of the art 3D modeling and immersive technologies, we created a historic 3D model and immersive experiences of Penn State, exemplarily for the 1922 campus. The resulting experiences can be accessed through the web but also through head mounted displays (HMDs) and mobile phones in combination with VR viewers such as the Google Cardboard. Additionally, they can be used anywhere in the world or on the campus itself as a way to enable remote and in situ experiences and learning. Immersive experiences let us connect to the past, the present and the future, and as such offer value to digital cultural heritage efforts.  相似文献   
65.
Against the backdrop of Spain’s Transparency Act, this article discusses the presence or otherwise of a series of document types, proposed as management-related transparency indicators, on 61 (8 national and 53 provincial) historic archive websites. Although examples of good practice were identified, the information provided was found to be scant, in particular as regards lines of action, organisational objectives and yearly reports. The information most commonly provided on the websites included the collection classification chart, service use regulations and citizen charters. The inference drawn was that archives, so intently focused on their role in the application of the Act by the organisations they serve, neglect their own administrative obligations in respect of its provisions. The recommendation is that as government-funded and subsidised public service institutions, historic archives should exercise transparency by furnishing the information stipulated in the Act on their websites.  相似文献   
66.
ABSTRACT

Course: Mixed-Method Communication Research Methods

Objective: The purpose of this semester-long activity is to provide students with opportunities to cultivate mixed-method communication research skills through a social justice-informed service-learning format. Completing this course, students will be able to: recognize the unique strengths of quantitative and qualitative research methods; locate, evaluate, and utilize scholarly literature for a literature review; conduct an original research project using quantitative and qualitative research methods to gather and analyze data; and raise self and community awareness about a social issue through collaboration with a community organization.  相似文献   
67.
68.
This article arises from a four week study of a class of 14‐15 year old students. The study explored students’ perception of themselves as writers and the effects of a variety of teaching and learning strategies on their creative writing responses. The aim of the project was to enhance the students’ creative writing, whilst ascertaining whether there were particular activities or types of writing that would lead to students perceiving more satisfactory outcomes in their writing. It answers the research question: What do I observe, and what do my students say, about the experience of different classroom based creative writing tasks?  相似文献   
69.
With the rise of microfluidics for the past decade, there has come an ever more pressing need for a low-cost and rapid prototyping technology, especially for research and education purposes. In this article, we report a rapid prototyping process of chromed masks for various microfluidic applications. The process takes place out of a clean room, uses a commercially available video-projector, and can be completed in less than half an hour. We quantify the ranges of fields of view and of resolutions accessible through this video-projection system and report the fabrication of critical microfluidic components (junctions, straight channels, and curved channels). To exemplify the process, three common devices are produced using this method: a droplet generation device, a gradient generation device, and a neuro-engineering oriented device. The neuro-engineering oriented device is a compartmentalized microfluidic chip, and therefore, required the production and the precise alignment of two different masks.  相似文献   
70.
Editorial     
B. Sury 《Resonance》2017,22(5):431-432
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号