首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   527篇
  免费   14篇
  国内免费   1篇
教育   325篇
科学研究   132篇
各国文化   5篇
体育   31篇
综合类   4篇
文化理论   5篇
信息传播   40篇
  2023年   9篇
  2022年   10篇
  2021年   22篇
  2020年   12篇
  2019年   32篇
  2018年   31篇
  2017年   43篇
  2016年   23篇
  2015年   23篇
  2014年   33篇
  2013年   64篇
  2012年   37篇
  2011年   22篇
  2010年   27篇
  2009年   22篇
  2008年   25篇
  2007年   14篇
  2006年   9篇
  2005年   12篇
  2004年   10篇
  2003年   11篇
  2002年   11篇
  2001年   6篇
  2000年   7篇
  1999年   1篇
  1997年   1篇
  1996年   2篇
  1995年   1篇
  1993年   2篇
  1992年   2篇
  1991年   3篇
  1990年   2篇
  1989年   2篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1980年   1篇
  1978年   1篇
  1976年   1篇
  1975年   1篇
  1970年   1篇
  1967年   1篇
排序方式: 共有542条查询结果,搜索用时 9 毫秒
491.
The struggle against illiteracy is a problem of great importance in Turkey as in many other countries. In Turkey the democratisation and secularisation of education have been a difficult process. Despite strong educational efforts in recent years, the country still presents various forms of inequality, such as considerable disparities between women and men, between town and country and between different regions. Unequal socio-economic, cultural and educational development, and attachment to cultural traditions are some of the factors that influence these inequalities. At the same time, Turkey is confronted by the sore problem of the education of linguistic minorities (especially the Kurds), who are not officially recognised as the cultural policy of Turkey aims to assimilate them. Thus, in the 1920s the Kurdish language was forbidden along with all languages other than Turkish, the official national language.  相似文献   
492.
Information protection is of paramount importance in today's world. From information involving the highest level of government administration and national security, to information existing at the level of the private company in the form of trade secrets or personal data, all are under the constant threat of being compromised. In this study, the researchers attempt to evaluate the information security maturity level and provide clear thoughtful analysis of the information security landscapes of the Malaysian Public Service (MPS) organizations. This study uses convenience sampling and the required data collected from 970 targeted individuals through a self-administrated survey. In addition, a survey questionnaire is utilized to gauge the security landscape and to further understand the occurrence of incidents, the sources of attack, and the types of technical safeguard. Findings revealed that the highest security incidents experienced by the MPS were spamming (42%), followed by attacks of malicious codes (41%). Twenty-five percent of incidents originated from within the organizations, 15% originated from outside, and 11% were from a mixture of internal and external sources. Also, it shows that 49% of incidents were from sources unknown to the respondents. The top most deployed safeguards by the MPS were found to be firewalls (95%), followed by anti-virus software (92%), and access control to information system (89%). Findings on the maturity level show that 61% of respondents are at Level 3, followed by 21% at Level 2 where the information security processes are still considered an Information and Communication Technology (ICT) domain. At the higher end of the continuum lies 13% for Level 4 and 1% at Level 5.  相似文献   
493.
Test assembly is the process of selecting items from an item pool to form one or more new test forms. Often new test forms are constructed to be parallel with an existing (or an ideal) test. Within the context of item response theory, the test information function (TIF) or the test characteristic curve (TCC) are commonly used as statistical targets to obtain this parallelism. In a recent study, Ali and van Rijn proposed combining the TIF and TCC as statistical targets, rather than using only a single statistical target. In this article, we propose two new methods using this combined approach, and compare these methods with single statistical targets for the assembly of mixed‐format tests. In addition, we introduce new criteria to evaluate the parallelism of multiple forms. The results show that single statistical targets can be problematic, while the combined targets perform better, especially in situations with increasing numbers of polytomous items. Implications of using the combined target are discussed.  相似文献   
494.
495.
Iron deficiency anemia is one of the causes that lead to significant mortality and morbidity among pregnant women and fetus. The present study was undertaken to explore oral iron supplementation can modify the metal contents in pregnant anemic women. Iron and folic acid supplementations was given to 500 anemic women (mild = 200, moderate = 200, and severe = 100) and 100 age matched non-anemic controls daily for 100 days. Blood index values and plasma trace minerals were estimated as per standard protocols. Haemoglobin and ferritin levels were found significantly increased (p < 0.001) in anemic and control subjects after treatment. Moreover, the serum transferring receptor levels and total iron binding capacity were found significantly decreased in all treated groups. Iron (Fe), zinc (Zn) and copper (Cu) levels were found increased (p < 0.01) after oral iron supplementation groups. Moreover, selenium (Se) manganese (Mn) and were found to be decreased in all treated groups. Data provides the conclusion that iron and folic acid supplementation recovered the essential trace minerals, except manganese, which may lead to various complications including peroxidation of vital body molecules resulting in increased risk for pregnant women as well as fetus.  相似文献   
496.
Urine is a proven source of metabolite biomarkers and has the potential to be a rapid, noninvasive, inexpensive, and efficient diagnostic tool for various human diseases. Despite these advantages, urine is an under-investigated source of biomarkers for multiple sclerosis (MS). The objective was to investigate the level of some urinary metabolites (urea, uric acid and hippuric acid) in patients with MS and correlate their levels to the severity of the disease, MS subtypes and MS treatment. The urine samples were collected from 73 MS patients-48 with RRMS and 25 with SPMS- and age matched 75 healthy controls. The values of urinary urea, uric acid and hippuric acid in MS patients were significantly decreased, and these metabolites in SPMS pattern showed significantly decrease than RRMS pattern. Also showed significant inverse correlation with expanded disability status scale and number of relapses. Accordingly, they may act as a potential urinary biomarkers for MS, and correlate to disease progression.  相似文献   
497.
498.
Influence and capital are two concepts used to evaluate scholarly outputs, and these can be measured using the Scholarly Capital Model as a modelling tool. The tool looks at the concepts of connectedness, venue representation, and ideational influence using centrality measures within a social network. This research used co‐authorships and h‐indices to investigate authors who have published papers in the field of information behaviour between 1980 and 2015 as extracted from Web of Science. The findings show a relationship between the authors’ connectedness and the venue (journal) representation. It could be seen that the venue (journal) influences the chance of citation, and equally, the prestige (centrality) of authors probably raises the citations of the journals. The research also shows a significant positive relationship between the venue representation and ideational influence. This means that a research work that is published in a highly cited journal will find more visibility and will receive more citations.  相似文献   
499.
河北医药制造企业实施联合采购,能有效降低企业采购成本、提升利润空间。就联合采购实施的优势、模式以及需要解决等问题进行探讨。  相似文献   
500.
Collaborative filtering (CF) is a popular method for personalizing product recommendations for e-commerce applications. In order to recommend a product to a user and predict that user’s preference, CF utilizes product evaluation ratings of like-minded users. The process of finding like-minded users forms a social network among all users and each link between two users represents an implicit connection between them. Users having more connections with others are the most influential users. Attacking recommender systems is a new issue for these systems. Here, an attacker tries to manipulate a recommender system in order to change the recommendation output according to her wish. If an attacker succeeds, her profile is used over and over again by the recommender system, making her an influential user. In this study, we applied the established attack detection methods to the influential users, instead of the whole user set, to improve their attack detection performance. Experiments were conducted using the same settings previously used to test the established methods. The results showed that the proposed influence-based method had better detection performance and improved the stability of a recommender system for most attack scenarios. It performed considerably better than established detection methods for attacks that inserted low numbers of attack profiles (20–25 %).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号