首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   30972篇
  免费   453篇
  国内免费   20篇
教育   22246篇
科学研究   2354篇
各国文化   406篇
体育   2862篇
综合类   10篇
文化理论   330篇
信息传播   3237篇
  2021年   299篇
  2020年   485篇
  2019年   727篇
  2018年   983篇
  2017年   940篇
  2016年   928篇
  2015年   598篇
  2014年   751篇
  2013年   5892篇
  2012年   688篇
  2011年   733篇
  2010年   594篇
  2009年   589篇
  2008年   715篇
  2007年   626篇
  2006年   595篇
  2005年   529篇
  2004年   519篇
  2003年   474篇
  2002年   474篇
  2001年   580篇
  2000年   612篇
  1999年   535篇
  1998年   348篇
  1997年   345篇
  1996年   408篇
  1995年   362篇
  1994年   363篇
  1993年   305篇
  1992年   450篇
  1991年   464篇
  1990年   434篇
  1989年   445篇
  1988年   414篇
  1987年   387篇
  1986年   381篇
  1985年   431篇
  1984年   347篇
  1983年   370篇
  1982年   306篇
  1981年   316篇
  1980年   332篇
  1979年   411篇
  1978年   307篇
  1977年   278篇
  1976年   248篇
  1975年   221篇
  1974年   214篇
  1973年   204篇
  1971年   200篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
171.
Automatic detection of source code plagiarism is an important research field for both the commercial software industry and within the research community. Existing methods of plagiarism detection primarily involve exhaustive pairwise document comparison, which does not scale well for large software collections. To achieve scalability, we approach the problem from an information retrieval (IR) perspective. We retrieve a ranked list of candidate documents in response to a pseudo-query representation constructed from each source code document in the collection. The challenge in source code document retrieval is that the standard bag-of-words (BoW) representation model for such documents is likely to result in many false positives being retrieved, because of the use of identical programming language specific constructs and keywords. To address this problem, we make use of an abstract syntax tree (AST) representation of the source code documents. While the IR approach is efficient, it is essentially unsupervised in nature. To further improve its effectiveness, we apply a supervised classifier (pre-trained with features extracted from sample plagiarized source code pairs) on the top ranked retrieved documents. We report experiments on the SOCO-2014 dataset comprising 12K Java source files with almost 1M lines of code. Our experiments confirm that the AST based approach produces significantly better retrieval effectiveness than a standard BoW representation, i.e., the AST based approach is able to identify a higher number of plagiarized source code documents at top ranks in response to a query source code document. The supervised classifier, trained on features extracted from sample plagiarized source code pairs, is shown to effectively filter and thus further improve the ranked list of retrieved candidate plagiarized documents.  相似文献   
172.
Stickiness refers to the set of persuasive message properties: simple, unexpected, concrete, credible, emotional, and stories (SUCCES). Heath and Heath (2007) argue that a sticky message is expected to be more memorable and hence more persuasive than a non-sticky message. A 2 (sticky v. non-sticky message) x 3 (pretest v. posttest v. delayed test) longitudinal experiment is employed to examine the persuasiveness of sticky messages on applying sunscreen. Results of a mixed model analysis of variance show that the sticky message produces attitudes and behaviors more favorable to the message recommendation than the non-sticky message. Specifically, a time × message induction non-additive effect was found, which sustained only in the sticky message condition across time. Despite this interesting effect, its explanation remains elusive.  相似文献   
173.
Inconsistency is often considered an indication of deceit. The conceptualization of consistency used in deception research, however, has not made a clear distinction between two concepts long differentiated by philosophers: coherence and correspondence. The existing literature suggests that coherence is not generally useful for deception detection. Correspondence, however, appears to be quite useful. The present research developed a model of how correspondence is utilized to make judgments, and this article reports on four studies designed to elaborate on the model. The results suggest that judges attend strongly to correspondence and that they do so in an additive fashion. As noncorrespondent information accumulates, an increasingly smaller proportion of judges make truthful assessments of guilty suspects. This work provides a basic framework for examining how information is utilized to make deception judgments and forms the correspondence and coherence module of truth-default theory.  相似文献   
174.
This article explores people’s susceptibility to political deception. Participants watched a news interview in which a politician either answered all the questions or deceptively evaded a question. In Study 1 (n = 202), deception is perceived through the dodge being irrelevant for voters who do not identify with the politician. In Study 2 (n = 618), partisan voters consider the politician more deceptive, and acting more deceptively, when the politician has their opposing party affiliation, independent of whether he dodges. When the politician shares their party identification, voters identify with the politician more and consider his responses more relevant. Findings are consistent with theoretical positions of identification, the cooperative principle, and social identity.  相似文献   
175.
Textbook vetting and evaluation process intends to ensure that the materials provided are relevant, of the required quality, suitable ad would enhance learning efficiency and effectiveness. The paper investigates the role of publishers and Tanzania Institute of Education (TIE) in the textbooks vetting and evaluation process; examines factors used to vet, evaluate and approve primary and secondary school textbooks in Tanzania and proposes Strategies that would enhance the textbook vetting, evaluation and process. The study used a mixed method research design. Respondents were selected educational publishers; MoEVT, Baraza la Kiswahili Tanzania, TIE, and Publishers Association of Tanzania. Questionnaire and semi- structured interview were used to collect data which were analysed qualitatively and quantitatively. Major findings of the study were; textbooks vetting and evaluation process is not professionally conducted although standard criteria have been established; there is not well established roles among key players involved in the vetting and evaluation process leading to conflict of interest between TIE and the publishers. The study recommends establishing an independent professional evaluation board and a well-defined timetable and effective communication among various players; enacting a book policy and adopting a limited multiple-textbook publishing system.  相似文献   
176.
This study replicated a previous research project addressing connections between family-of-origin communication and organizational dissent expression. We predicted that family communication patterns (FCPs), specifically conversation and conformity orientations, would predict upward, lateral, and displaced dissent. As in the original study, significant findings emerged for upward dissent and conformity orientation. This replication study indicated family type as an inconsistent predictor of expressed dissent. Contrary to the original study, we found no evidence to support a connection between pluralistic family types and upward dissent. Finally, as an extension of the original study we analyzed effects of FCPs on displaced dissent, finding an inverse association with conversation orientation. Implications for future research are discussed.  相似文献   
177.
178.
The mere perception that news has given certain problems more coverage can lead the audience to assume that those problems are more important. Given that the news media, at times, obsesses over relatively trivial matters, and given that the audience is increasingly able to filter media exposure, it is worth asking what happens when audience members perceive that recent media coverage has not emphasized any very important problems. In such cases, audience members might assume that any problems facing the nation must not be particularly important. We explicate this attitude of political complacency, test whether perceived media agendas lacking important problems can influence it, and explore whether complacency helps explain political disengagement. We also explore whether these effects generalize beyond news, to new media gatekeepers such as Twitter. Two experiments tested effects of a perceived absence of important problems in recent news or Twitter content. In the case of news, but not Twitter, this increased complacency in both studies. Study 2 added a no-exposure control and found that effects on complacency were driven by the cueing of nonproblem stories, not by the absence of problem story cues. Both studies validated complacency as a predictor of political disengagement.  相似文献   
179.
180.
Self‐efficacy is a universal construct, but few validated measures exist for researchers in developing countries to use in assessing youths’ perceptions of their ability to achieve academic success. This study examined the cross‐cultural suitability and psychometric properties of an academic self‐efficacy scale (ASES) adapted for the Ghanaian context. ASES construct validity was assessed with a sample of 4,289 Ghanaian junior high‐school students and exploratory and confirmatory factor analysis. Invariance testing assessed the scale's measurement equivalence by gender and temporal stability of gender equivalence. The ASES is a valid, reliable one‐dimensional scale for assessing young Ghanaians’ perceptions of their academic capabilities, and it works equally well across genders. As adapted, ASES is a valid scale with utility for researchers examining predictors and effects of academic self‐efficacy. The ASES has important implications for decisions regarding investment in programs aimed at improving academic self‐efficacy of youth, both in sub‐Saharan Africa and the increasingly diverse American public schools.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号