全文获取类型
收费全文 | 198篇 |
免费 | 4篇 |
国内免费 | 3篇 |
专业分类
教育 | 141篇 |
科学研究 | 30篇 |
各国文化 | 2篇 |
体育 | 8篇 |
综合类 | 6篇 |
信息传播 | 18篇 |
出版年
2022年 | 1篇 |
2021年 | 9篇 |
2020年 | 4篇 |
2019年 | 1篇 |
2018年 | 6篇 |
2017年 | 6篇 |
2016年 | 1篇 |
2015年 | 3篇 |
2014年 | 8篇 |
2013年 | 31篇 |
2012年 | 10篇 |
2011年 | 13篇 |
2010年 | 6篇 |
2009年 | 19篇 |
2008年 | 7篇 |
2007年 | 9篇 |
2006年 | 8篇 |
2005年 | 5篇 |
2004年 | 8篇 |
2003年 | 7篇 |
2002年 | 5篇 |
2001年 | 5篇 |
2000年 | 4篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1993年 | 5篇 |
1992年 | 2篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1989年 | 3篇 |
1985年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1972年 | 1篇 |
1970年 | 1篇 |
1969年 | 1篇 |
1828年 | 1篇 |
排序方式: 共有205条查询结果,搜索用时 15 毫秒
131.
132.
Audrey C. Rule Samantha Baldwin Robert Schell 《International Journal of Science Education》2013,35(9):1159-1182
This study examined the use of form and function analogy object boxes to teach second graders (n = 21) animal adaptations. The study used a pretest–posttest design to examine animal adaptation content learned through focused analogy activities as compared with reading and Internet searches for information about adaptations of animals followed by making an informative puppet play. Students participated in six week‐long lesson sets, each addressing adaptations of two animals, which alternated between the two conditions. In the analogy condition, students matched cards explaining form and function analogies of animal body parts or homes to analogous manufactured items. They mapped analogies, thought of alternate manufactured items, and created new analogies. Students scored similarly on material to be taught through both conditions on the pretest, but made significantly higher posttest mean scores (76.1% analogy versus 57.2% traditional condition) with large effect size (partial η2 = 0.58) on animal adaptation content learned through the analogy activities. This study shows the usefulness of form and function analogies in teaching product innovations to second‐grade students, indicating that early childhood students are able to successfully engage in sophisticated analogy activities. Efficacy of the analogy activities was related to objects that focused attention, motivated, and gave concrete representations of concepts; to cards and graphic organizers for organization, connections, and memory; and to complex thinking activities that challenged students and promoted peer interaction. 相似文献
133.
134.
答邦俊 《广州体育学院学报》2013,33(1):111-114
采用数据分析法、问卷调查法和文献资料法,以2011年新疆自治区大学生武术竞赛为研究视角和研究对象,对西部地区高校竞技武术水平现状进行分析和研究。研究发现,目前新疆37所普通高校中石河子大学、新疆医科大学竞技武术水平较为突出,其次是新疆大学和新疆师范大学,新疆昌吉学院和教育学院竞技武术训练发展较为普及和重视。分析认为,影响西部地区高校竞技武术发展水平的因素有高校武术运动员选材机制和培养模式、高校体育竞技武术管理模式、武术文化底蕴和校园武术文化氛围等多方面因素。 相似文献
135.
136.
In this paper, we describe an operational methodology for characterizing the architecture of complex technical systems and demonstrate its application to a large sample of software releases. Our methodology is based upon directed network graphs, which allows us to identify all of the direct and indirect linkages between the components in a system. We use this approach to define three fundamental architectural patterns, which we label core–periphery, multi-core, and hierarchical. Applying our methodology to a sample of 1286 software releases from 17 applications, we find that the majority of releases possess a “core–periphery” structure. This architecture is characterized by a single dominant cyclic group of components (the “Core”) that is large relative to the system as a whole as well as to other cyclic groups in the system. We show that the size of the Core varies widely, even for systems that perform the same function. These differences appear to be associated with different models of development – open, distributed organizations develop systems with smaller Cores, while closed, co-located organizations develop systems with larger Cores. Our findings establish some “stylized facts” about the fine-grained structure of large, real-world technical systems, serving as a point of departure for future empirical work. 相似文献
137.
笪林梅 《商丘职业技术学院学报》2014,(2):28-30
为了保障物联网信息安全,文章通过技术手段和管理方法,提出了一些物联网信息安全策略。基于射频识别技术和无线传输安全隐患,采用身份认证、访问控制、入侵检测和自我修复等节点安全技术,限制数据包发送速度及传输次数和引入可信匿名认证机制等传输安全技术,加强密钥管理,促进技术研发。基于物联网缺乏安全管理平台和法律保障体系等安全问题,提出加强物联网管理,实施立法保护。 相似文献
138.
139.
140.
目的本研究的第一个目的是模拟在血液收集和分析场所之间针对样品转移可选择的方法,第二个目的是对比同一样本在不同的天数时所得的分析结果.方法26名健康男性(年龄20~50岁)志愿提供血液样本.血液离心后得到的血清,被分成7部分.每一部分都被单独处理以模拟不同的转移方法和存储条件.随后分析每一部分中的乳酸脱氢酶(LDH),乳酸脱氢酶同工酶1(LDH-1),肌酸激酶(CK)和肌酸激酶心型同工酶(CK-MB)的活性.结果CK和CK-MB在基础值和其他样本中所得结果没有显著性差异(P>0.05);LDH和LDH-1也有相似的结果,只是在模拟不带冰转移时,其结果显著高于基础值(P<0.05).结论采用带冰的容器转移血液样本,然后冷冻.这样,即使推迟5天测量,其结果也不会受到影响. 相似文献