首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3595篇
  免费   12篇
教育   2500篇
科学研究   572篇
各国文化   6篇
体育   136篇
综合类   7篇
文化理论   65篇
信息传播   321篇
  2022年   6篇
  2021年   22篇
  2020年   13篇
  2019年   24篇
  2018年   80篇
  2017年   121篇
  2016年   205篇
  2015年   128篇
  2014年   80篇
  2013年   213篇
  2012年   163篇
  2011年   185篇
  2010年   96篇
  2009年   56篇
  2008年   103篇
  2007年   82篇
  2006年   75篇
  2005年   709篇
  2004年   483篇
  2003年   312篇
  2002年   148篇
  2001年   80篇
  2000年   42篇
  1999年   38篇
  1998年   12篇
  1997年   13篇
  1996年   10篇
  1995年   10篇
  1994年   6篇
  1993年   10篇
  1992年   6篇
  1991年   3篇
  1990年   7篇
  1989年   9篇
  1988年   5篇
  1987年   9篇
  1986年   5篇
  1985年   9篇
  1984年   4篇
  1983年   8篇
  1982年   2篇
  1981年   1篇
  1980年   3篇
  1978年   1篇
  1977年   1篇
  1976年   4篇
  1975年   1篇
  1974年   1篇
  1973年   1篇
  1965年   1篇
排序方式: 共有3607条查询结果,搜索用时 15 毫秒
11.
试论“网球肘”的成因、诊断、预防与治疗   总被引:2,自引:0,他引:2  
“网球肘”是网球运动中常见的一种伤病。通过研究“网球肘”的成因、诊断、预防与治疗,预防伤病的发生。  相似文献   
12.
This article describes an informal approach to human rights education, which is anchored in reality and based on experience gained throughout the Arab region and more particularly within the Arab Institute for Human Rights. It is argued that the approach of the Institute could be adopted on a larger scale by organisations working in this domain, not only in the Arab region but also in other regions of the world. The article emphasises the essential role of governments and the importance of cooperation between the governmental and non-governmental levels in order to implement this type of human rights education in informal learning situations, and thus to disseminate a universal culture of human rights.  相似文献   
13.
We theorize about the strategic alignment of computing with organizational mission, using the Commonwealth of Pennsylvania's efforts to pursue digital government initiatives as evidence. To do this we draw on a decade (1995–2004) of changes in Pennsylvania to characterize how a state government shifts from an organizational to an enterprise perspective regarding computing. We document and analyze the strategic and operational aspects of a series of information and communications technology (ICT) planning efforts to highlight the nature and roles of strategic alignment used to achieve this transition. Findings from this analysis mark the importance of combining several approaches to strategic planning regarding the adoption and application of ICT.  相似文献   
14.
15.
The digital shift has provided easy access to academic library users, and yet, the usage of archival collections continues to be low. At the same time, the need for innovation in library services for cultural heritage scholarship and its advancement is emerging. This paper outlines a library-led service-learning program that connects students with lighthouse artifacts, archival collections, scholars in global academia, and wider communities. Student engagement cases are provided to illustrate the way in which the librarian utilizes the Framework of Information Literacy for Higher Education by ACRL to work closely with students. These cases also demonstrate how students can contribute to knowledge creation and preservation efforts for a specific cultural heritage topic that is not static, but which keeps receiving new contributions or additions to the depository. Thus, this paper is an answer to the ACRL's call for pilot projects to be assessed and shared with the wider community of academic librarians and support staff. It also builds on emerging roles for academic libraries like engaged learning. Librarians must move beyond simply seeing themselves as partners. Instead, librarians should see themselves as prime facilitators that co-create and co-develop cultural heritage research and historical projects by connecting actors and resources more effectively than any single actor can do alone.  相似文献   
16.
Automatic detection of source code plagiarism is an important research field for both the commercial software industry and within the research community. Existing methods of plagiarism detection primarily involve exhaustive pairwise document comparison, which does not scale well for large software collections. To achieve scalability, we approach the problem from an information retrieval (IR) perspective. We retrieve a ranked list of candidate documents in response to a pseudo-query representation constructed from each source code document in the collection. The challenge in source code document retrieval is that the standard bag-of-words (BoW) representation model for such documents is likely to result in many false positives being retrieved, because of the use of identical programming language specific constructs and keywords. To address this problem, we make use of an abstract syntax tree (AST) representation of the source code documents. While the IR approach is efficient, it is essentially unsupervised in nature. To further improve its effectiveness, we apply a supervised classifier (pre-trained with features extracted from sample plagiarized source code pairs) on the top ranked retrieved documents. We report experiments on the SOCO-2014 dataset comprising 12K Java source files with almost 1M lines of code. Our experiments confirm that the AST based approach produces significantly better retrieval effectiveness than a standard BoW representation, i.e., the AST based approach is able to identify a higher number of plagiarized source code documents at top ranks in response to a query source code document. The supervised classifier, trained on features extracted from sample plagiarized source code pairs, is shown to effectively filter and thus further improve the ranked list of retrieved candidate plagiarized documents.  相似文献   
17.
18.
Test security is not an end in itself; it is important because we want to be able to make valid interpretations from test scores. In this article, I propose a framework for comprehensive test security systems: prevention, detection, investigation, and resolution. The article discusses threats to test security, roles and responsibilities, rigorous training for everyone involved in testing, and an evaluation of current practices in test security. I call on everyone responsible for testing programs—the Association of Test Publishers, Council of Chief State School Officers, National Council on Measurement in Education, U.S. Department of Education, and state assessment program managers, their vendors, and the research community—to collaborate on guidelines and practices for security violation prevention, detection, investigation, and resolution.  相似文献   
19.
20.
Students with Attention Deficit Hyperactivity Disorders (ADHD) frequently experience significant difficulty mastering basic academic skills. This meta‐analysis focuses on one specific potential area of learning difficulties for these students: namely, writing. To identify the extent and depth of the potential writing challenges faced by students with ADHD, we conducted a meta‐analysis comparing the writing performance of grade 1 to 12 students with ADHD to their normally achieving peers. We located 44 papers, yielding 45 studies with 87 effect sizes. The average weighted effect sizes showed that students with ADHD obtained lower scores than their normally achieving peers for writing quality (–0.78), output (–0.64), number of genre elements (–0.69), vocabulary (–0.76), spelling (–0.80), and handwriting (–0.62). Contrary to expectations, moderator analyses found that neither study quality nor the source from which ADHD students were drawn (i.e., school/community vs. clinic/hospital) accounted for variability above sampling error alone.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号