首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20057篇
  免费   287篇
  国内免费   24篇
教育   13953篇
科学研究   2376篇
各国文化   195篇
体育   1559篇
综合类   8篇
文化理论   144篇
信息传播   2133篇
  2021年   196篇
  2020年   267篇
  2019年   391篇
  2018年   536篇
  2017年   493篇
  2016年   495篇
  2015年   329篇
  2014年   435篇
  2013年   3555篇
  2012年   416篇
  2011年   447篇
  2010年   388篇
  2009年   322篇
  2008年   383篇
  2007年   331篇
  2006年   341篇
  2005年   299篇
  2004年   342篇
  2003年   286篇
  2002年   256篇
  2001年   554篇
  2000年   393篇
  1999年   339篇
  1998年   183篇
  1997年   217篇
  1996年   206篇
  1995年   182篇
  1994年   192篇
  1993年   190篇
  1992年   278篇
  1991年   289篇
  1990年   285篇
  1989年   289篇
  1988年   244篇
  1987年   249篇
  1986年   257篇
  1985年   298篇
  1984年   237篇
  1983年   229篇
  1982年   211篇
  1981年   188篇
  1980年   181篇
  1979年   254篇
  1978年   211篇
  1977年   190篇
  1976年   156篇
  1975年   158篇
  1974年   161篇
  1973年   162篇
  1971年   149篇
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
121.
Automatic detection of source code plagiarism is an important research field for both the commercial software industry and within the research community. Existing methods of plagiarism detection primarily involve exhaustive pairwise document comparison, which does not scale well for large software collections. To achieve scalability, we approach the problem from an information retrieval (IR) perspective. We retrieve a ranked list of candidate documents in response to a pseudo-query representation constructed from each source code document in the collection. The challenge in source code document retrieval is that the standard bag-of-words (BoW) representation model for such documents is likely to result in many false positives being retrieved, because of the use of identical programming language specific constructs and keywords. To address this problem, we make use of an abstract syntax tree (AST) representation of the source code documents. While the IR approach is efficient, it is essentially unsupervised in nature. To further improve its effectiveness, we apply a supervised classifier (pre-trained with features extracted from sample plagiarized source code pairs) on the top ranked retrieved documents. We report experiments on the SOCO-2014 dataset comprising 12K Java source files with almost 1M lines of code. Our experiments confirm that the AST based approach produces significantly better retrieval effectiveness than a standard BoW representation, i.e., the AST based approach is able to identify a higher number of plagiarized source code documents at top ranks in response to a query source code document. The supervised classifier, trained on features extracted from sample plagiarized source code pairs, is shown to effectively filter and thus further improve the ranked list of retrieved candidate plagiarized documents.  相似文献   
122.
Textbook vetting and evaluation process intends to ensure that the materials provided are relevant, of the required quality, suitable ad would enhance learning efficiency and effectiveness. The paper investigates the role of publishers and Tanzania Institute of Education (TIE) in the textbooks vetting and evaluation process; examines factors used to vet, evaluate and approve primary and secondary school textbooks in Tanzania and proposes Strategies that would enhance the textbook vetting, evaluation and process. The study used a mixed method research design. Respondents were selected educational publishers; MoEVT, Baraza la Kiswahili Tanzania, TIE, and Publishers Association of Tanzania. Questionnaire and semi- structured interview were used to collect data which were analysed qualitatively and quantitatively. Major findings of the study were; textbooks vetting and evaluation process is not professionally conducted although standard criteria have been established; there is not well established roles among key players involved in the vetting and evaluation process leading to conflict of interest between TIE and the publishers. The study recommends establishing an independent professional evaluation board and a well-defined timetable and effective communication among various players; enacting a book policy and adopting a limited multiple-textbook publishing system.  相似文献   
123.
Oh and LaRose (2016) contended that problem severity and channel publicness shape support seekers’ goals, time spent composing messages, and the sophistication of those messages. The current study seeks to replicate and extend Oh and LaRose’s study to produce a more accurate understanding of the factors that influence the sophistication of support-seeking messages online. Support seekers’ goals varied according to the severity of a stressor and the publicness of a channel, and the amount of time people spent composing a message influenced its sophistication. We extend the original study by examining associations that were not initially tested. Time spent composing messages mediated the influence of problem severity on the quality of people’s messages, and this effect was moderated by channel publicness.  相似文献   
124.
125.
ABSTRACT

Employing a number of different standalone programs is a prevalent approach among communication scholars who use computational methods to analyze media content. For instance, a researcher might use a specific program or a paid service to scrape some content from the Web, then use another program to process the resulting data, and finally conduct statistical analysis or produce some visualizations in yet another program. This makes it hard to build reproducible workflows, and even harder to build on the work of earlier studies. To improve this situation, we propose and discuss four criteria that a framework for automated content analysis should fulfill: scalability, free and open source, adaptability, and accessibility via multiple interfaces. We also describe how to put these considerations into practice, discuss their feasibility, and point toward future developments.  相似文献   
126.
ABSTRACT

Course: Mixed-Method Communication Research Methods

Objective: The purpose of this semester-long activity is to provide students with opportunities to cultivate mixed-method communication research skills through a social justice-informed service-learning format. Completing this course, students will be able to: recognize the unique strengths of quantitative and qualitative research methods; locate, evaluate, and utilize scholarly literature for a literature review; conduct an original research project using quantitative and qualitative research methods to gather and analyze data; and raise self and community awareness about a social issue through collaboration with a community organization.  相似文献   
127.
128.
129.
With the rise of microfluidics for the past decade, there has come an ever more pressing need for a low-cost and rapid prototyping technology, especially for research and education purposes. In this article, we report a rapid prototyping process of chromed masks for various microfluidic applications. The process takes place out of a clean room, uses a commercially available video-projector, and can be completed in less than half an hour. We quantify the ranges of fields of view and of resolutions accessible through this video-projection system and report the fabrication of critical microfluidic components (junctions, straight channels, and curved channels). To exemplify the process, three common devices are produced using this method: a droplet generation device, a gradient generation device, and a neuro-engineering oriented device. The neuro-engineering oriented device is a compartmentalized microfluidic chip, and therefore, required the production and the precise alignment of two different masks.  相似文献   
130.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号