首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   618篇
  免费   15篇
  国内免费   20篇
教育   369篇
科学研究   118篇
体育   15篇
综合类   20篇
文化理论   2篇
信息传播   129篇
  2024年   1篇
  2023年   8篇
  2022年   20篇
  2021年   27篇
  2020年   28篇
  2019年   29篇
  2018年   18篇
  2017年   28篇
  2016年   17篇
  2015年   15篇
  2014年   34篇
  2013年   81篇
  2012年   41篇
  2011年   43篇
  2010年   29篇
  2009年   26篇
  2008年   27篇
  2007年   26篇
  2006年   26篇
  2005年   23篇
  2004年   16篇
  2003年   22篇
  2002年   20篇
  2001年   15篇
  2000年   18篇
  1999年   7篇
  1998年   4篇
  1997年   2篇
  1995年   1篇
  1993年   1篇
排序方式: 共有653条查询结果,搜索用时 15 毫秒
501.
政策工具对农户秸秆还田技术采纳行为的影响效果分析   总被引:2,自引:0,他引:2  
基于388份农户的调研样本数据,对农户秸秆还田技术采纳情况分别构建二元选择Logit模型,定量分析政策工具刺激影响的效果。结果表明监管约束与惩罚、补贴、信息诱导3种政策工具的刺激对总体样本农户秸秆还田技术采纳行为具有正向影响。为进一步验证政策工具在不同地区刺激的影响效果,分别对样本中属于大西南(非平原)和华北平原两类地区农户采纳行为进行分析比较,发现监管约束与惩罚、信息诱导措施在两类地区中都发挥着积极的作用,有效刺激农户采纳该技术;补贴激励措施在非平原地区中的影响不显著,未起到预期效果,而在平原地区中对促进农户采纳秸秆还田技术起到积极的效果。  相似文献   
502.
介绍聚类算法的过程以及聚类有效性指标的分类,分别评述科学计量学常用软件中的几种聚类算法,分析聚类算法的特性并采用基于类内紧密度和类间分离度对聚类结果的有效性进行探讨,总结各聚类算法的效果并对应软件分析的结果进行案例分析。  相似文献   
503.
This article explains how after 43 years of unsatisfactory outcomes, the Ministry of Education of Peru (MoE) suddenly ranked at the top of governmental performance tables. To do so, this study relies on implementation and major discussions of policy instrument theories to provide a comprehensive explanation of the reasons underlying the MoE’s improvements. Methodologically, this research employs the mixed research methods paradigm. It combines process-tracing and regression analysis. The analyses show that the MoE underwent three major events in its route to achieve policy success. First, the approval of a long-term policy plan (National Educative Plan to 2021); second, the contentious legitimisation of governmental policies against Peru’s teachers’ union and its eventual defeat; and, third, the recentralisation of historically dispersed control functions in the MoE. The results indicate that upon the occurrence of these reforms, MoE’s bureaucrats could gain teachers’ legitimacy and eventually achieve complementarity of policy tools. In fact, the multiple regression analysis suggests positive and significant interdependence between the set of tools employed by MoE officers: parents’ voluntary monetary contribution to schools (sermon), economic incentives to outperform schools (carrots) and trimestral oversight of schools’ performance (sticks). Results also show that MoE’s tools are positively associated with satisfactory student-learning outcomes.  相似文献   
504.
WEB课程及其开发工具   总被引:1,自引:0,他引:1  
本文首先分析了基于WEB的网络课程的组成及其特性,然后从WEB课程的设计,开发及WEB课程开发工具等几个方面进行了讨论。  相似文献   
505.
本文通过实例介绍一个中型企业内部网络的建设思路,内容包括如何在网络上建立数据库服务器,如何与前端工具配合构成一个完整的C/S数据库应用,如何将局域网与国际网安全连接.  相似文献   
506.
本文通过对SQL数据库服务器的存贮过程的介绍,并以Delphi开发工具为例描述了在网络数据库中使用存贮过程的方法,以提高数据库服务器资源,改善程序的性能,提高程序的运行效率。  相似文献   
507.
运用专利分析进行竞争对手跟踪   总被引:16,自引:1,他引:15  
许玲玲 《情报科学》2005,23(8):1271-1276
专利是企业开展竞争情报的重要信息源之一。将专利分析方法应用到企业竞争情报实践中,可以帮助企业识别竞争对手、掌握竞争对手的技术特点及实力,还可以帮助企业推断竞争对手的市场策略。网上专利数据库方便了专利信息的检索,而相应专利分析软件的出现又使得专利分析更加快捷有效。  相似文献   
508.
国内知识图谱应用研究综述   总被引:64,自引:0,他引:64  
以知识图谱在情报学领域中的应用为例,首先简要介绍情报学知识图谱研究的必要性、现状、发展趋势以及知识图谱绘制工具及方法流程,然后对在国内248篇知识图谱研究文献进行内容分析,全面梳理知识图谱在情报学领域及其子领域的应用概况,并简要介绍知识图谱在其他学科或领域中的应用。  相似文献   
509.
This paper presents an approach enabling economic modelling of information security risk management in contemporaneous businesses and other organizations. In the world of permanent cyber attacks to ICT systems, risk management is becoming a crucial task for minimization of the potential risks that can endeavor their operation. The prevention of the heavy losses that may happen due to cyber attacks and other information system failures in an organization is usually associated with continuous investment in different security measures and purchase of data protection systems. With the rise of the potential risks the investment in security services and data protection is growing and is becoming a serious economic issue to many organizations and enterprises. This paper analyzes several approaches enabling assessment of the necessary investment in security technology from the economic point of view. The paper introduces methods for identification of the assets, the threats, the vulnerabilities of the ICT systems and proposes a procedure that enables selection of the optimal investment of the necessary security technology based on the quantification of the values of the protected systems. The possibility of using the approach for an external insurance based on the quantified risk analyses is also provided.  相似文献   
510.
In this study, we seek to describe how the meaning of a tool was co-constructed by the students and their teacher and how the students used the tool to construct mathematical meaning out of particular tasks. We report the results of a qualitative, classroom-based study that examined (1) the role, knowledge and beliefs of a pre-calculus teacher, (2)how students used graphing calculators in support of their learning of mathematics, (3) the relationship and interactions between the teacher's role, knowledge and beliefs and the students' use of the graphing calculator in learning mathematics, and (4) some constraints of the graphing calculator technology that emerged within the classroom practice. We found five patterns and modes of graphing calculator tool use emerged in this practice: computational tool, transformational tool, data collection and analysis tool, visualizing tool, and checking tool. The results of this study suggest that nature of the mathematical tasks and the role, knowledge and beliefs of the teacher influenced the emergence of such rich usage of the graphing calculator. We also found that the use of the calculator as a personal device can inhibit communication in a small group setting, while its use as a shared device supported mathematical learning in the whole class setting.This revised version was published online in September 2005 with corrections to the Cover Date.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号