全文获取类型
收费全文 | 623篇 |
免费 | 2篇 |
专业分类
教育 | 272篇 |
科学研究 | 26篇 |
各国文化 | 251篇 |
体育 | 13篇 |
文化理论 | 2篇 |
信息传播 | 61篇 |
出版年
2021年 | 2篇 |
2020年 | 6篇 |
2019年 | 12篇 |
2018年 | 8篇 |
2017年 | 3篇 |
2016年 | 7篇 |
2015年 | 7篇 |
2014年 | 9篇 |
2013年 | 110篇 |
2012年 | 6篇 |
2011年 | 8篇 |
2010年 | 11篇 |
2009年 | 31篇 |
2008年 | 54篇 |
2007年 | 70篇 |
2006年 | 49篇 |
2005年 | 30篇 |
2004年 | 35篇 |
2003年 | 12篇 |
2002年 | 12篇 |
2001年 | 6篇 |
2000年 | 4篇 |
1999年 | 3篇 |
1997年 | 2篇 |
1996年 | 6篇 |
1995年 | 7篇 |
1994年 | 5篇 |
1993年 | 8篇 |
1992年 | 6篇 |
1991年 | 6篇 |
1990年 | 4篇 |
1989年 | 5篇 |
1988年 | 5篇 |
1987年 | 4篇 |
1986年 | 3篇 |
1985年 | 13篇 |
1984年 | 4篇 |
1983年 | 6篇 |
1982年 | 8篇 |
1981年 | 5篇 |
1979年 | 5篇 |
1978年 | 4篇 |
1977年 | 3篇 |
1975年 | 2篇 |
1973年 | 2篇 |
1972年 | 2篇 |
1968年 | 3篇 |
1967年 | 3篇 |
1926年 | 1篇 |
1920年 | 1篇 |
排序方式: 共有625条查询结果,搜索用时 15 毫秒
111.
112.
Rebecca D. Ray Amy L. Shelton Nick Garber Hollon Bethany D. Michel Carl B. Frankel James J. Gross John D. E. Gabrieli 《Child development》2009,80(4):1232-1242
Processing the self-relevance of information facilitates recall. Similarly, processing close-other-related information facilitates recall to a lesser degree than processing self-relevant information. This memory advantage may be viewed as an index of the degree to which the representation of self is differentiated from representations of close others. To test developmental hypotheses concerning the self, this study examined the relation of memory for self- and mother-referentially processed information in participants age 7–13 years (Experiment 1: N = 37; Experiment 2: N = 14). Memory for words encoded with reference to oneself increases with age, relative to memory for words encoded with reference to one's mother. When used as an individual difference measure, the difference in self versus mother memory correlates with regions of the rostral anterior cingulate associated with affective salience. 相似文献
113.
Dynamic Bayesian Networks in Educational Measurement: Reviewing and Advancing the State of the Field
Ray Reichenberg 《教育实用测度》2018,31(4):335-350
As the popularity of rich assessment scenarios increases so must the availability of psychometric models capable of handling the resulting data. Dynamic Bayesian networks (DBNs) offer a fast, flexible option for characterizing student ability across time under psychometrically complex conditions. In this article, a brief introduction to DBNs is offered, followed by a review of the existing literature on the use of DBNs in educational and psychological measurement with a focus on methodological investigations and novel applications that may provide guidance for practitioners wishing to deploy these models. The article concludes with a discussion of future directions for research in the field. 相似文献
114.
For cancer patients, the enumeration of rare circulating tumor cells (CTCs) in peripheral blood is a strong prognostic indicator of the severity of the cancer; for the general population, the capture of CTCs is needed for use as a clinical tool for cancer screening, early detection, and treatment assessment. Here, we present a fast, high-purity (∼90%) and high-efficiency (>90%) method for the segregation and undamaged recovery of CTCs using a spatially gradated microfluidic chip. Further, by lysing the red blood cells we achieved not only a significant reduction in the overall processing time but also mitigated the blood clogging problem commonly encountered in microfluidic-based CTC isolation systems. To clinically validate the chip, we employed it to detect and capture CTCs from 10 liver cancer patients. Positive CTC enumeration was observed in all the blood samples, and the readings ranged from a low of 1–2 CTCs (1 patient) to a high of >20 CTCs (2 patients) with the balance having 3–20 CTCs per 3-ml blood sample. The work here indicates that our system can be developed for use in cancer screening, metastatic assessment, and chemotherapeutic response and for pharmacological and genetic evaluation of single CTCs. 相似文献
115.
Paul B. Gastin Owen C. Mclean Ray V.P. Breed Michael Spittle 《Journal of sports sciences》2013,31(10):947-953
AbstractThe effectiveness of a wearable microsensor device (MinimaxXTM S4, Catapult Innovations, Melbourne, VIC, Australia) to automatically detect tackles and impact events in elite Australian football (AF) was assessed during four matches. Video observation was used as the criterion measure. A total of 352 tackles were observed, with 78% correctly detected as tackles by the manufacturer’s software. Tackles against (i.e. tackled by an opponent) were more accurately detected than tackles made (90% v 66%). Of the 77 tackles that were not detected at all, the majority (74%) were categorised as low-intensity. In contrast, a total of 1510 “tackle” events were detected, with only 18% of these verified as tackles. A further 57% were from contested ball situations involving player contact. The remaining 25% were in general play where no contact was evident; these were significantly lower in peak Player Load? than those involving player contact (P < 0.01). The tackle detection algorithm, developed primarily for rugby, was not suitable for tackle detection in AF. The underlying sensor data may have the potential to detect a range of events within contact sports such as AF, yet to do so is a complex task and requires sophisticated sport and event-specific algorithms. 相似文献
116.
Ray G. Burdett 《Research quarterly for exercise and sport》2013,84(3):193-197
Abstract The lifting techniques of 10 world-class weightlifters were compared to those of 26 skilled collegiate weightlifters while performing the first portion of the snatch, from the lift-off of the barbell to the catch of the barbell overhead with the body in a squatting position. Cinematography was used to measure the joint angles, position of the center of gravity of the body, and the position of the barbell. Results indicated that the world-class weightlifters raised the barbell to a relatively lower height, assumed more flexed positions at the hips and knees with a smaller angle between the shank and floor during certain stages of the lift, and lowered their bodies more rapidly during the squatting portion of the lift than the collegiate weightlifters. 相似文献
117.
local government authorities (LGAs) are organised around operational structures with business processes spanning within departments and across other government organisations. In such an organisational setting, the harmonisation of Information Technology (IT) operations, integration of cross-departmental processes and the underlying Information Systems (IS) signifies a challenge in delivering integrated services. This paper attempts to explore enterprise application integration (EAI) adoption in the UK local government authorities (LGAs). Despite the hype of EAI adoption in private domain, its application in LGAs is inadequate as there is a lack of adoption models/frameworks that can be used by the public sector. The context of the study is to consider the transformation of IT infrastructure management and operations with EAI technologies. The empirical findings, generated through a detailed case analysis, manifestly exemplify that EAI predominantly acts as a ‘back-office’ technology that facilitates operations by developing a flexible and maintainable integrated IT infrastructure. Our proposed framework is believed to be imperative and unique as it provides a more systematic way to examine the adoption of integration technologies, extends the established norms for EAI adoption by utilising a prioritisation technique to classify the importance of factors. The contribution of the research extends the literature on EAI and identifies theoretical and practical opportunities that facilitate LGAs in their decision-making process to produce more robust proposals for EAI adoption. 相似文献
118.
Security measures have been well established within the waterfall development life cycle model. However, more software projects are using the spiral development life cycle model. Software developers and project managers can easily forget about adapting security measures. The spiral model uses iterative steps that can create changes in each phase of software development process. This will challenge security to ensure the application has few flaws or vulnerabilities that could be exploited. Failure to impose the right security measures at each of these phases can open up vulnerabilities for hackers to exploit and prove costly in patching. This paper will explore areas where security can be engaged within each iteration step of the spiral development model. This way security can continue protection of the software product as it becomes ready for deployment. The paper will help organizations realize where to deploy security measures to reduce vulnerabilities in the software application. 相似文献
119.
Linda Banwell Kathryn Ray Graham Coulson Christine Urquhart Ray Lonsdale Chris Armstrong Rhian Thomas Siân Spink Alison Yeoman Roger Fenton Jennifer Rowley 《British journal of educational technology : journal of the Council for Educational Technology》2004,35(5):607-616
This article aims to provide a baseline for future studies on the provision and support for the use of digital or electronic information services (EIS) in further education. The analysis presented is based on a multi‐level model of access, which encompasses access to and availability of information and communication technology (ICT) resources, access to and availability of EIS resources, and the third leg of staff skills and their development. The research was conducted within the third cycle of the JISC (Joint Information Services Committee) User Behaviour Monitoring and Evaluation Framework, in 2001/2002. Evidence was gathered from library and information service web sites and various stakeholders, including library and information service staff, academic staff and students to generate insights into the provision of access to EIS in further education. Sector‐wide funding initiatives have had a significant impact on ICT infrastructures, and these attract a positive response from students. EIS are represented on some library web sites but both web site development and EIS availability is very much less advanced than in higher education. Staff, however, lack sufficient dedicated access to ICT to be able to develop their own skills and use. There remains a low level of access to electronic information resources, with only limited access to these resources through library web sites. LIS managers face a number of challenges in enhancing this provision, including licensing arrangements, tight budgets that need to be spread across many discipline areas, and the absence of EIS designed specifically for the further education student. The other key challenge lies in the provision of time and opportunity for academic and LIS staff to develop their ICT and EIS skills, and, more generally in the further development of the role of Information and Learning Technology (ILT) Champions. 相似文献
120.
Keke Lai Samuel B. Green Roy Levy Ray E. Reichenberg Yuning Xu Marilyn S. Thompson 《Structural equation modeling》2016,23(4):491-506
Two models can be nonequivalent, but fit very similarly across a wide range of data sets. These near-equivalent models, like equivalent models, should be considered rival explanations for results of a study if they represent plausible explanations for the phenomenon of interest. Prior to conducting a study, researchers should evaluate plausible models that are alternatives to those hypothesized to evaluate whether they are near-equivalent or equivalent and, in so doing, address the adequacy of the study’s methodology. To assess the extent to which alternative models for a study are empirically distinguishable, we propose 5 indexes that quantify the degree of similarity in fit between 2 models across a specified universe of data sets. These indexes compare either the maximum likelihood fit function values or the residual covariance matrices of models. Illustrations are provided to support interpretations of these similarity indexes. 相似文献