全文获取类型
收费全文 | 111篇 |
免费 | 3篇 |
专业分类
教育 | 55篇 |
科学研究 | 47篇 |
体育 | 5篇 |
信息传播 | 7篇 |
出版年
2022年 | 2篇 |
2020年 | 3篇 |
2019年 | 4篇 |
2018年 | 15篇 |
2017年 | 8篇 |
2016年 | 7篇 |
2015年 | 7篇 |
2014年 | 9篇 |
2013年 | 8篇 |
2012年 | 6篇 |
2011年 | 5篇 |
2010年 | 4篇 |
2009年 | 2篇 |
2008年 | 3篇 |
2007年 | 4篇 |
2005年 | 6篇 |
2003年 | 2篇 |
2002年 | 1篇 |
1996年 | 1篇 |
1990年 | 2篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1982年 | 3篇 |
1981年 | 2篇 |
1973年 | 1篇 |
1963年 | 2篇 |
1961年 | 1篇 |
排序方式: 共有114条查询结果,搜索用时 15 毫秒
71.
Holger Daun Reza Arjmand 《International Review of Education/Internationale Zeitschrift für Erziehungswissenschaft/Revue internationale l'éducation》2005,36(1):403-426
While European education systems fundamentally rest on a rather monolithic world-view, some of them are explicitly oriented
towards Christianity and others are comparatively secular. Apart from this, they differ in the way that they offer opportunities
for Muslim minorities to enjoy a modern and competitive as well as religious-moral education. Principally, there are three
approaches. The first allows private Muslim schools which are neither subsidized nor controlled or regulated by the state.
Other countries require Muslim schools to apply for approval, and such schools are then subsidized and regulated; but they
do not have to teach a national curriculum. In a third group of countries, only schools that teach the national curriculum
are permitted, and they are subsidized and controlled by the state. In the latter case, because Islamic matters are not taught
in these schools, many Muslim parents send their children to non-formal Qur’anic schools in the evening or during weekends.
This study examines some typical arrangements in a number of countries. 相似文献
72.
Mahmood Hussain Shah Hamid Reza Peikari Norjaya M. Yasin 《International Journal of Information Management》2014
Despite the critical role of individuals’ perceived security in an online environment, previous research has not attempted to comprehensively study the influences and interrelations between the determinants of online individuals’ perceived security. This research employs five theories to examine the interrelations that might exist between the antecedents of individuals’ perceived security in online environment in Malaysia. It is the first attempt to empirically examine the interrelations of the confidentiality related factors identified in the literature which is a significant original contribution. A questionnaire was the primary research methodology and structural equation modeling was employed to test the hypotheses. The findings suggest that individuals’ perceptions about security are significantly influenced by their perceived technical protection while technical protection was found to be influenced by website design features. Moreover, it was found that individuals’ perceptions toward internally provided assurances are highly influenced by externally provided assurances. However, the results found no significant relations between internally and externally provided assurances about a website's security. The findings imply that e-retailers should launch well-designed websites and communicate the technical protection capabilities of their websites to address individuals’ security concerns. The results also suggest that e-traders should consider the factors influencing individuals’ security perceptions when designing/developing their websites. 相似文献
73.
M. Reza Salehizadeh Noureddin Behin-Aein 《European Journal of Engineering Education》2014,39(2):188-200
In the Iranian higher education system, including engineering education, effective implementation of cooperative learning is difficult because classrooms are usually crowded and the students never had a formal group working background in their previous education. In order to achieve the benefits of cooperative learning in this condition, this paper proposes a combination of cooperative learning and inquiry method. The method is implemented by grouping students in a way that the learning procedure is done in non-official class sessions by each group, while the inquiry method is done in the regular programmed class sessions. The study is performed in Islamic Azad University and the methods are implemented in two engineering economic classes with different numbers of students in each working group. The results are compared with a control class in which traditional teaching style is implemented. The results of analysis show simultaneous improvement of learning and behavioural attitudes of the students with cooperative learning plus inquiry method in the classroom with a fewer number of students in each working group. 相似文献
74.
75.
Reza Gharibi Amir Hossein Rasekh Mohammad Hadi Sadreddini Seyed Mostafa Fakhrahmad 《Information processing & management》2018,54(6):1058-1076
Bug reports are an essential part of a software project's life cycle since resolving them improves the project's quality. When a new bug report is received, developers usually need to reproduce the bug and perform code review to locate the bug and assign it to be fixed. However, the huge number of bug reports and the increasing size of software projects make this process tedious and time-consuming. To solve this issue, bug localization techniques try to rank all the source files of a project with respect to how likely they are to contain a bug. This process reduces the search space of source files and helps developers to find relevant source files quicker. In this paper, we propose a multi-component bug localization approach that leverages different textual properties of bug reports and source files as well as the relations between previously fixed bug reports and a newly received one. Our approach uses information retrieval, textual matching, stack trace analysis, and multi-label classification to improve the performance of bug localization. We evaluate the performance of the proposed approach on three open source software projects (i.e., AspectJ, SWT, and ZXing) and the results show that it can rank appropriate source files for more than 52% of bugs by recommending only one source file and 78% by recommending ten files. It also improves the MRR and MAP values compared to several existing state-of-the-art bug localization approaches. 相似文献
76.
77.
European Journal of Psychology of Education - Theoretical developments in second or foreign language motivation research have led to a better understanding of the convoluted nature of motivation in... 相似文献
78.
This experimental project investigated the reliability and validity of rubrics in assessment of students’ written responses to a social science “writing prompt”. The participants were asked to grade one of the two samples of writing assuming it was written by a graduate student. In fact both samples were prepared by the authors. The first sample was well written in terms of sentence structure, spelling, grammar, and punctuation; however, the author did not fully answer the question. The second sample fully answered each part of the question, but included multiple errors in structure, spelling, grammar and punctuation. In the first experiment, the first sample was assessed by participants once without a rubric and once with a rubric. In the second experiment, the second sample was assessed by participants once without a rubric and once with a rubric. The results showed that raters were significantly influenced by mechanical characteristics of students’ writing rather than the content even when they used a rubric. Study results also indicated that using rubrics may not improve the reliability or validity of assessment if raters are not well trained on how to design and employ them effectively. 相似文献
79.
Mohd. Sahandri Gani B. Hamzah Mohd. Reza Ghorbani Saifuddin Kumar B. Abdullah 《美中教育评论》2009,6(11):75-79
Communication technology is changing things. Language is no exception. Some language researchers argue that language is deteriorating due to increased use in electronic communication. The present paper investigated 100 randomly selected electronic mails (e-mails) and 50 short messaging system (SMS) messages of a representative sample of international students in University Putra Malaysia (UPM) to find out the impact of these two specific modes of electronic communication on written language use. The e-mails from UPM International Students Association (UPM-ISA) yahoo group were content analyzed. A non-probability convenience sampling was used to select the 50 short message services sent to the researcher about different subject matters by Malaysian and international students at UPM. Then, they were also content analyzed. The results indicated that the language used in students' e-mails and SMS messaging was full of spoken-like spelling, unconventional use of punctuation and abbreviations, and ungrammatical sentences. However, the more in-depth content analysis of the data revealed that the written language is being creatively adapted, developed, and enhanced to suit the conditions of the electronic communication age. Syntactical and lexical reductions are just strategies used to reduce effort, time and space. 相似文献
80.
This paper aims at providing new design approaches for positive observers of discrete-time positive linear systems based on a construction method of linear copositive Lyapunov function for positive systems. First, an efficient positive observer design approach is proposed by using linear programming such that the observer error system is exponentially stable. Furthermore, an interval observer design is proposed for uncertain positive systems. Then, the results are extended to positive time delay systems. In contrast with the previous design approaches, the new design method provides a general observer design with lower computational burden. Finally, three comparison examples are given to show the merit of the new design approach. 相似文献