全文获取类型
收费全文 | 426篇 |
免费 | 10篇 |
国内免费 | 1篇 |
专业分类
教育 | 211篇 |
科学研究 | 68篇 |
各国文化 | 18篇 |
体育 | 87篇 |
综合类 | 1篇 |
文化理论 | 2篇 |
信息传播 | 50篇 |
出版年
2024年 | 3篇 |
2022年 | 3篇 |
2020年 | 1篇 |
2016年 | 2篇 |
2015年 | 6篇 |
2014年 | 17篇 |
2013年 | 9篇 |
2012年 | 34篇 |
2011年 | 41篇 |
2010年 | 14篇 |
2009年 | 10篇 |
2008年 | 23篇 |
2007年 | 31篇 |
2006年 | 41篇 |
2005年 | 29篇 |
2004年 | 29篇 |
2003年 | 17篇 |
2002年 | 7篇 |
2001年 | 9篇 |
2000年 | 17篇 |
1999年 | 8篇 |
1998年 | 1篇 |
1997年 | 5篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1994年 | 5篇 |
1993年 | 3篇 |
1992年 | 7篇 |
1991年 | 6篇 |
1990年 | 2篇 |
1989年 | 6篇 |
1988年 | 4篇 |
1987年 | 6篇 |
1986年 | 4篇 |
1985年 | 6篇 |
1984年 | 2篇 |
1983年 | 5篇 |
1982年 | 4篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1958年 | 1篇 |
1957年 | 1篇 |
1955年 | 1篇 |
1954年 | 1篇 |
1948年 | 1篇 |
1942年 | 2篇 |
1938年 | 2篇 |
1936年 | 1篇 |
1934年 | 1篇 |
排序方式: 共有437条查询结果,搜索用时 241 毫秒
1.
1931年“九·一八”事变,日本侵略军侵占东北,又于1936年春侵占冀东22县和察北6县。7月初,化德特务机关长田中隆吉指使伪西北防共自治军正副司令于志谦、马子玉率部进犯绥远兴和。当时的国民党35军军长兼绥远省主席傅作义将军下令兴和驻军许书庭营反击,俘马子玉等60余人。7月底,日伪防共自治军总司令王道一,率三千余人进犯绥东土木尔台、红格尔图两地,经当地驻军反击,毙伤敌伪过半。王道一逃回商都,被日寇枪决。此后,日伪更加紧备战,准备大举进攻绥远。根据情报得悉:王英由商都经陶林进占绥西;李守信由商都攻占集宁;张万庆由 相似文献
2.
Zi Yue'er 《中外文化交流(英文版)》2006,(10):32-35
Jiangxi Provincial Museum stands at an island surrounded by Ganjiang River and Fuhe River of Nanchang, capital city of Jiang xi Province. To its north is Tengwang Tower, one of the three most famous ancient tower architectures of south China. The museum, with an area of 60 mu (approx. 400, 000 square meters), has a floor space of 35,000 square meters, including 13,000 square meters)or exhibition halls. 相似文献
3.
4.
na Education I 《中国图书馆学报》2006,(1)
ina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Educati 相似文献
5.
1.Introduction
The reproduction systems of 3D images without using eyeglasses and other special accessories has always attracted attention and aroused great interest of developers and consumers of such equipment because of totally accurate image and method of its presentation.Such systems can be used and are already partially used in advertising,television,different devices (i.e.smartphones,tablet computers),at the exhibitions,etc.,as well as in various technical applications,training systems,simulators,etc. 相似文献
6.
OBJECTIVE: This study compared recidivism rates for alleged maltreatment perpetrators whose initial report was substantiated and those whose initial report was not substantiated, to determine whether they returned to the child welfare system at differing rates. METHOD: Statewide administrative child welfare services data over a period of 4 1/2 years was analyzed. The sample included 31,531 perpetrators of intrafamilial maltreatment. Separate analyses were conducted for each type of maltreatment (sexual abuse, physical abuse, and neglect). RESULTS: Bivariate relationships (substantiation status and recidivism) were analyzed using survival curves, and the study found that recidivism patterns differed by type of maltreatment and by substantiation status at the index event. Multivariate analyses using Cox Proportional Hazards models found that bivariate relationships held true even when controlling for neighborhood mean income, ethnicity, and gender. CONCLUSIONS: The study's finding that perpetrators whose index event was not substantiated return to the child welfare system at a high rate suggests the need to learn how to discriminate those unsubstantiated alleged perpetrators who are most at risk for recidivism. The finding of frequent cross-type recidivism indicates that intervention should focus on common themes across maltreatment types. 相似文献
7.
OBJECTIVE: Assessing the risk of further offending behavior by adult sexual perpetrators of children is highly relevant and important to professionals involved in child protection. Recent progress in assessing risk in sexual offenders has established the validity of actuarial measures, although there continues to be some debate about the application of these instruments. This paper summarizes the debate between clinical and actuarial approaches and reviews the "base rate" for United Kingdom sexual offense reconviction. METHOD: A review of the literature revealed 16 UK sexual reconviction studies, 8 using incarcerated samples (N=5,915) and 8 using non-incarcerated samples (N=1,274). UK estimates of sexual reconviction rates are compared with European and North American studies. RESULTS: The mean sexual reconviction rates for the incarcerated sample at 2 years (6.0%), 4 years (7.8%) and 6 years or more (19.5%) were higher than that of the comparative non-incarcerated sample at 2 years (5.7%), up to 4 years (5.9%), and 6 years or more (15.5%). The overall sexual reconviction rate for both samples combined was 5.8% at 2 years, and 17.5% at 6 years or more. CONCLUSIONS: The sexual reconviction rate for incarcerated sexual offenders is higher than that of non-incarcerated sexual offenders. The UK sexual reconviction rates were comparable with European and North American studies. 相似文献
8.
Ortiz R Jiménez JE García Miranda E Guzmán Rosquete R Hernández-Valle I Rodrigo M Estévez A Díaz A Hernández Expósito S 《Journal of learning disabilities》2007,40(1):80-92
The aims of this study were (a) to determine whether Spanish children with reading disabilities (RD) show a speech perception deficit and (b) to explore the locus and nature of this perceptive deficit. A group of 29 children with RD, 41 chronological age-matched controls, and 27 reading ability-matched younger controls were tested on tasks of speech perception. The effect of linguistic unit (word vs. syllable) and type of phonetic contrast (voicing, place and manner of articulation) were analyzed in terms of the number of errors and the response time. The results revealed a speech perception deficit in Spanish children with RD that was independent of the type of phonetic contrast and of linguistic unit. 相似文献
9.
OBJECTIVE: To show how the results of research on children's memory, communicative skills, social knowledge, and social tendencies can be translated into guidelines that improve the quality of forensic interviews of children. METHOD: We review studies designed to evaluate children's capacities as witnesses, explain the development of the structured NICHD Investigative Interview Protocol, and discuss studies designed to assess whether use of the Protocol enhances the quality of investigative interviews. RESULTS: Controlled studies have repeatedly shown that the quality of interviewing reliably and dramatically improves when interviewers employ the NICHD Protocol. No other technique has been proven to be similarly effective. CONCLUSIONS: Use of the structured NICHD Protocol improves the quality of information obtained from alleged victims by investigators, thereby increasing the likelihood that interventions will be appropriate. 相似文献
10.
OBJECTIVES: The study was designed to explore whether the credibility of children's statements regarding their alleged experiences of child sexual abuse could be assessed in a more valid and reliable way when investigative interviews were conducted using the NICHD protocol rather than in an unstructured manner. METHODS: Forty-two experienced Israeli youth investigators each assessed the credibility of allegations of sexual abuse made by alleged victims of sexual abuse when interviewed either with or without the protocol. Half of the alleged incidents were judged likely to have happened ("plausible") on the basis of independent evidence, while half were deemed unlikely to have happened ("implausible"). RESULTS: More non-protocol than protocol interviews were rated as "No judgment possible" rather than either credible or incredible. Allegations made in protocol interviews were more accurately rated as credible or incredible when they were either plausible or implausible, respectively, than those made in non-protocol statements. Levels of inter-rater reliability were also higher when protocol interviews were rated. The differences were significant only for plausible cases, however. CONCLUSIONS: The use of the NICHD protocol facilitated the assessment of credibility by child investigators although incredible allegations (those describing incidents that were unlikely to have happened) remained difficult to detect, even when the protocol was used. 相似文献