首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   206篇
  免费   4篇
教育   136篇
科学研究   21篇
各国文化   2篇
体育   34篇
文化理论   5篇
信息传播   12篇
  2022年   2篇
  2021年   3篇
  2020年   7篇
  2019年   13篇
  2018年   15篇
  2017年   13篇
  2016年   7篇
  2015年   5篇
  2014年   1篇
  2013年   49篇
  2012年   7篇
  2011年   3篇
  2010年   4篇
  2009年   4篇
  2008年   1篇
  2007年   6篇
  2005年   6篇
  2004年   4篇
  2003年   3篇
  2002年   3篇
  2001年   1篇
  2000年   2篇
  1999年   4篇
  1998年   3篇
  1997年   4篇
  1996年   2篇
  1995年   3篇
  1994年   1篇
  1993年   2篇
  1992年   1篇
  1991年   2篇
  1990年   1篇
  1988年   4篇
  1986年   3篇
  1984年   1篇
  1983年   1篇
  1982年   2篇
  1981年   3篇
  1978年   4篇
  1977年   1篇
  1976年   1篇
  1975年   2篇
  1974年   1篇
  1973年   1篇
  1971年   1篇
  1967年   1篇
  1934年   1篇
  1926年   1篇
排序方式: 共有210条查询结果,搜索用时 15 毫秒
11.
This paper is an attempt to present disclosive ethics as a framework for computer and information ethics – in line with the suggestions by Brey, but also in quite a different manner. The potential of such an approach is demonstrated through a disclosive analysis of facial recognition systems. The paper argues that the politics of information technology is a particularly powerful politics since information technology is an opaque technology – i.e. relatively closed to scrutiny. It presents the design of technology as a process of closure in which design and use decisions become black-boxed and progressively enclosed in increasingly complex socio-technical networks. It further argues for a disclosive ethics that aims to disclose the nondisclosure of politics by claiming a place for ethics in every actual operation of power – as manifested in actual design and use decisions and practices. It also proposes that disclosive ethics would aim to trace and disclose the intentional and emerging enclosure of politics from the very minute technical detail through to social practices and complex social-technical networks. The paper then proceeds to do a disclosive analysis of facial recognition systems. This analysis discloses that seemingly trivial biases in recognition rates of FRSs can emerge as very significant political acts when these systems become used in practice. Paper prepared for the Technology and Ethics Workshop at Twente  相似文献   
12.
Today all parties within the health-care system demand more information and evidence to take more efficient and pinpointed management decisions. Their goal is a better patient and patient-care management. This paper presents an information visualisation approach to discover knowledge for the management of tele-home care for the elderly using the video-telephone: what type of elderly need what type of video-telephone interventions? This document focuses on the synthesis aspects of data mining with a view to knowledge discovery: the global, holistic, synthesis approach. More specifically, it summarises visually the relationships among the types of video-telephony care, among the segments of elderly, and between the types of interventions and the segments of elderly simultaneously. The graphical display allows delineating areas that group elderly with a similar/dissimilar video-telephony care profile. Information visualisation is a promising approach to provide insight into large multidimensional data sets. It fosters knowledge discovery.  相似文献   
13.
14.
ABSTRACT

This study aimed to examine the effects of two jump squat (JS) training programs involving different loading ranges in under-20 soccer players during a preseason period. Twenty-three elite young soccer players performed sprint speed (at 5-, 10-, and 20-m), change-of-direction (COD) speed, JS peak-power (PP), and countermovement jump (CMJ) tests pre and post four weeks of training. Athletes were pair-matched in two groups according to their optimum power loads (OPL) as follows: lower than OPL (LOPL; athletes who trained at a load 20% lower than the OPL) and higher than OPL (HOPL; athletes who trained at a load 20% higher than the OPL). Magnitude-based inferences were used to compare pre- and post-training measures. Meaningful increases in the PP JS were observed for both groups. Likely and possible improvements were observed in the 5- and 10-m sprint velocity in the LOPL group. Meanwhile, possible and likely improvements were observed in the CMJ, 5- and 10-m sprint velocity, and COD speed in the HOPL group. Overall, both training schemes induced positive changes in athletic performance. Soccer coaches and sport scientists can implement the JS OPL-based training schemes presented here, either separately or combined, to improve the physical performance of youth soccer players.  相似文献   
15.

Key points

  • Twenty years ago, a fraction of articles were paired with supplements; now, one in five research stories go beyond PDF.
  • Why has the evolution of research content's delivery vehicles lagged behind the evolution of the research story?
  • Hyperlinked in‐line references are the most used feature of the Enhanced PDF – exposing faster, easier ways to follow the path of research.
  • Discovery need not start and end with the search engine – it can start within the PDF itself.
  • Discovery is not a solitary process; therefore, content platforms must support collaboration to drive readership.
  相似文献   
16.
Research in Science Education - This research draws on Legitimation Code Theory (LCT) to understand the epistemic dimension of the higher education classroom discourse of a professor who is well...  相似文献   
17.
18.
19.
20.
The behavior of 4 rats living in complex environments was monitored 24 h per day during free-feeding baseline and under conditions of periodic access to food. Under the periodic schedules, the minimum interfood interval (IFI) was increased from 16 to 512 sec in an ascending series. Periodic food produced robust overall increases in investigation of the feeder, drinking, general activity, and rearing, but not in wheel-running. The temporal distribution of behavior within the IFI was similar across subjects and supported the hypothesis that some responses were largely time-locked to the period immediately following eating, while other responses expanded to fill the interval. However, these response differences were not adequately captured by present classification schemes. Finally, the distribution of drinking following a food pellet strongly resembled the distribution of drinking following bouts of feeding in baseline. The results suggest that adjunctive behavior stems from three sources: (1) a simple increase in the number of opportunities for expression of normal preprandial and postprandial behavior, (2) an increase in the preprandial behavior directed toward the site of expected food, and (3) an increase in the postprandial distribution of both site-directed and more general exploratory behavior. These findings suggest that adjunctive behavior is not extraneous, but is an orderly distribution of responses ordinarily related to feeding and foraging for food.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号