全文获取类型
收费全文 | 18695篇 |
免费 | 200篇 |
国内免费 | 138篇 |
专业分类
教育 | 12991篇 |
科学研究 | 2613篇 |
各国文化 | 37篇 |
体育 | 845篇 |
综合类 | 383篇 |
文化理论 | 398篇 |
信息传播 | 1766篇 |
出版年
2024年 | 6篇 |
2023年 | 14篇 |
2022年 | 142篇 |
2021年 | 254篇 |
2020年 | 195篇 |
2019年 | 132篇 |
2018年 | 2262篇 |
2017年 | 2183篇 |
2016年 | 1661篇 |
2015年 | 431篇 |
2014年 | 549篇 |
2013年 | 549篇 |
2012年 | 813篇 |
2011年 | 1367篇 |
2010年 | 1397篇 |
2009年 | 930篇 |
2008年 | 1121篇 |
2007年 | 1660篇 |
2006年 | 519篇 |
2005年 | 763篇 |
2004年 | 654篇 |
2003年 | 544篇 |
2002年 | 304篇 |
2001年 | 170篇 |
2000年 | 93篇 |
1999年 | 87篇 |
1998年 | 56篇 |
1997年 | 42篇 |
1996年 | 26篇 |
1995年 | 24篇 |
1994年 | 17篇 |
1993年 | 12篇 |
1992年 | 8篇 |
1991年 | 19篇 |
1990年 | 5篇 |
1989年 | 5篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1982年 | 1篇 |
1976年 | 2篇 |
1974年 | 2篇 |
1957年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
971.
972.
在火灾环境中,智能机器人能否快速准确的灭火,是整个灭火事件的关键。针对这一问题,本文设计了一款基于国际赛制的智能灭火机器人,采用AS-MF10内核为32位的ARM Cortex TM-M3控制器,设计多个硬件和软件功能模块,运用经典的PID算法和加权控制算法的互补性,进行机器人姿态纠正,能有效避免过冲及沿墙行走出现S轨迹等一系列缺陷,利用此控制器系统的快速和稳定性,设计了多种关键策略,实现相应的灭火功能。整个系统在实际的运用中效果良好,实现了快速找到火源并将其熄灭的效果,有效提高了灭火效率,降低火灾带来的损失,增强了人们生活和生产的安全性。 相似文献
973.
研讨式教学作为高校教学改革的尝试,无疑是一次成功的实践。它借鉴了古代书院教学的有益经验,实现了教学与学术研究的紧密结合,强调了在学习过程中使用讨论法,要求学生独立思考、自主学习,密切了师生关系。同时,研讨式教学也有发展:它有丰富的学习资料和方式、广泛的学习途径,以培养学生的综合素质为宗旨。正是研讨式教学“取其精华”,又不断“推陈出新”,所以它对高校教学教学改革产生重大影响。 相似文献
974.
党的十八大提出了社会主义核心价值观。大学生是中国社会发展的主力军,是实现中华民族伟大复兴"中国梦"的践行者,当代大学生能否正确认识和践行社会主义核心价值观具有深刻的理论意义和实践意义。社会主义核心价值观是指导大学生努力上进的出发点,也是大学生行使使命的归宿。当代大学生学习和践行社会主义核心价值观有着诸多的有利环境,也面临着系列的影响和挑战,应在坚持勤学知识求解真知、修身养德服务人民、脚踏实地知行合一等原则下,寻求积极、有效的路径才能达到期待的目标。 相似文献
975.
O2O在线外卖顾客满意度评价体系区别于传统的餐饮顾客满意度评价,为提高O2O模式下在线外卖的顾客满意度,本文通过对顾客满意评价体系以及餐饮行业顾客满意因素研究,提出了O2O模式在线外卖用户满意度的模糊评价模型。模型给出在线外卖顾客满意的4个影响因素,即食品因素、价格因素、服务因素以及便利因素,其中食品因素对顾客满意的影响程度最大。利用模型对在线外卖的代表性平台"饿了么"进行顾客满意度的实证分析,验证了模糊评价体系可行性,并根据评价结果提出了提高O2O在线外卖顾客满意度的措施建议。 相似文献
976.
This paper presents an approach aimed at creating business ontologies for knowledge codification in company. It is based on the principles of ontological engineering and cognitive psychology. Ontologies that describe the main concepts of knowledge are used both for knowledge creation and codification. The proposed framework is targeted at the development of methodologies that can scaffold the process of knowledge structuring and orchestrating for better understanding and knowledge sharing. The orchestrating procedure is the kernel of ontology development. The main stress is put on using visual techniques of mind mapping. Cognitive bias and some results of Gestalt psychology are highlighted as a general guideline. The ideas of balance, clarity, and beauty are applied to the ontology orchestrating procedures. The examples are taken mainly from the project management practice. The paper contributes to managerial practice by describing the practical recommendations for effective knowledge management based on ontology engineering and knowledge structuring techniques. 相似文献
977.
It has been argued that the Internet and social media increase the number of available viewpoints, perspectives, ideas and opinions available, leading to a very diverse pool of information. However, critics have argued that algorithms used by search engines, social networking platforms and other large online intermediaries actually decrease information diversity by forming so-called “filter bubbles”. This may form a serious threat to our democracies. In response to this threat others have developed algorithms and digital tools to combat filter bubbles. This paper first provides examples of different software designs that try to break filter bubbles. Secondly, we show how norms required by two democracy models dominate the tools that are developed to fight the filter bubbles, while norms of other models are completely missing in the tools. The paper in conclusion argues that democracy itself is a contested concept and points to a variety of norms. Designers of diversity enhancing tools must thus be exposed to diverse conceptions of democracy. 相似文献
978.
Rami Ali 《Ethics and Information Technology》2015,17(4):267-274
Luck (2009) argues that gamers face a dilemma when it comes to performing certain virtual acts. Most gamers regularly commit acts of virtual murder, and take these acts to be morally permissible. They are permissible because unlike real murder, no one is harmed in performing them; their only victims are computer-controlled characters, and such characters are not moral patients. What Luck points out is that this justification equally applies to virtual pedophelia, but gamers intuitively think that such acts are not morally permissible. The result is a dilemma: either gamers must reject the intuition that virtual pedophelic acts are impermissible and so accept partaking in such acts, or they must reject the intuition that virtual murder acts are permissible, and so abstain from many (if not most) extant games. While the prevailing solution to this dilemma has been to try and find a morally relevant feature to distinguish the two cases, I argue that a different route should be pursued. It is neither the case that all acts of virtual murder are morally permissible, nor are all acts of virtual pedophelia impermissible. Our intuitions falter and produce this dilemma because they are not sensitive to the different contexts in which games present virtual acts. 相似文献
979.
Tom Harrison 《Ethics and Information Technology》2015,17(4):275-283
This article draws on a study investigating how 11–14 year olds growing up in England understand cyber-bullying as a moral concern. Three prominent moral theories: deontology, utilitarianism and virtue ethics, informed the development of a semi-structured interview schedule which enabled young people, in their own words, to describe their experiences of online and offline bullying. Sixty 11–14 year olds from six schools across England were involved with the research. Themes emerging from the interviews included anonymity; the absence of rules, monitoring and guidance and, the challenges associated with determining the consequences of online actions. The findings demonstrate the advantages of adopting a character-based moral theory to compliment rules and/or consequence based moral theories as the basis for future research into cyber-bullying. The findings evoke some wider implications for future research into cyber-bullying that might equally be applied to investigations into other Internet related moral concerns. 相似文献
980.