首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   426篇
  免费   10篇
  国内免费   1篇
教育   211篇
科学研究   68篇
各国文化   18篇
体育   87篇
综合类   1篇
文化理论   2篇
信息传播   50篇
  2024年   3篇
  2022年   3篇
  2020年   1篇
  2016年   2篇
  2015年   6篇
  2014年   17篇
  2013年   9篇
  2012年   34篇
  2011年   41篇
  2010年   14篇
  2009年   10篇
  2008年   23篇
  2007年   31篇
  2006年   41篇
  2005年   29篇
  2004年   29篇
  2003年   17篇
  2002年   7篇
  2001年   9篇
  2000年   17篇
  1999年   8篇
  1998年   1篇
  1997年   5篇
  1996年   1篇
  1995年   2篇
  1994年   5篇
  1993年   3篇
  1992年   7篇
  1991年   6篇
  1990年   2篇
  1989年   6篇
  1988年   4篇
  1987年   6篇
  1986年   4篇
  1985年   6篇
  1984年   2篇
  1983年   5篇
  1982年   4篇
  1981年   1篇
  1980年   2篇
  1979年   1篇
  1958年   1篇
  1957年   1篇
  1955年   1篇
  1954年   1篇
  1948年   1篇
  1942年   2篇
  1938年   2篇
  1936年   1篇
  1934年   1篇
排序方式: 共有437条查询结果,搜索用时 241 毫秒
1.
1931年“九·一八”事变,日本侵略军侵占东北,又于1936年春侵占冀东22县和察北6县。7月初,化德特务机关长田中隆吉指使伪西北防共自治军正副司令于志谦、马子玉率部进犯绥远兴和。当时的国民党35军军长兼绥远省主席傅作义将军下令兴和驻军许书庭营反击,俘马子玉等60余人。7月底,日伪防共自治军总司令王道一,率三千余人进犯绥东土木尔台、红格尔图两地,经当地驻军反击,毙伤敌伪过半。王道一逃回商都,被日寇枪决。此后,日伪更加紧备战,准备大举进攻绥远。根据情报得悉:王英由商都经陶林进占绥西;李守信由商都攻占集宁;张万庆由  相似文献   
2.
Jiangxi Provincial Museum stands at an island surrounded by Ganjiang River and Fuhe River of Nanchang, capital city of Jiang xi Province. To its north is Tengwang Tower, one of the three most famous ancient tower architectures of south China. The museum, with an area of 60 mu (approx. 400, 000 square meters), has a floor space of 35,000 square meters, including 13,000 square meters)or exhibition halls.  相似文献   
3.
Kevin  J.  O'Brien  刘小龙 《网络传播》2006,(4):82-83
导语:由法德两国联合推动,诞生于去年四月的欧洲搜索引擎研发计划,即将于今年夏天投入实施阶段。  相似文献   
4.
ina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Education InfoChina Educati  相似文献   
5.
1.Introduction The reproduction systems of 3D images without using eyeglasses and other special accessories has always attracted attention and aroused great interest of developers and consumers of such equipment because of totally accurate image and method of its presentation.Such systems can be used and are already partially used in advertising,television,different devices (i.e.smartphones,tablet computers),at the exhibitions,etc.,as well as in various technical applications,training systems,simulators,etc.  相似文献   
6.
OBJECTIVE: This study compared recidivism rates for alleged maltreatment perpetrators whose initial report was substantiated and those whose initial report was not substantiated, to determine whether they returned to the child welfare system at differing rates. METHOD: Statewide administrative child welfare services data over a period of 4 1/2 years was analyzed. The sample included 31,531 perpetrators of intrafamilial maltreatment. Separate analyses were conducted for each type of maltreatment (sexual abuse, physical abuse, and neglect). RESULTS: Bivariate relationships (substantiation status and recidivism) were analyzed using survival curves, and the study found that recidivism patterns differed by type of maltreatment and by substantiation status at the index event. Multivariate analyses using Cox Proportional Hazards models found that bivariate relationships held true even when controlling for neighborhood mean income, ethnicity, and gender. CONCLUSIONS: The study's finding that perpetrators whose index event was not substantiated return to the child welfare system at a high rate suggests the need to learn how to discriminate those unsubstantiated alleged perpetrators who are most at risk for recidivism. The finding of frequent cross-type recidivism indicates that intervention should focus on common themes across maltreatment types.  相似文献   
7.
OBJECTIVE: Assessing the risk of further offending behavior by adult sexual perpetrators of children is highly relevant and important to professionals involved in child protection. Recent progress in assessing risk in sexual offenders has established the validity of actuarial measures, although there continues to be some debate about the application of these instruments. This paper summarizes the debate between clinical and actuarial approaches and reviews the "base rate" for United Kingdom sexual offense reconviction. METHOD: A review of the literature revealed 16 UK sexual reconviction studies, 8 using incarcerated samples (N=5,915) and 8 using non-incarcerated samples (N=1,274). UK estimates of sexual reconviction rates are compared with European and North American studies. RESULTS: The mean sexual reconviction rates for the incarcerated sample at 2 years (6.0%), 4 years (7.8%) and 6 years or more (19.5%) were higher than that of the comparative non-incarcerated sample at 2 years (5.7%), up to 4 years (5.9%), and 6 years or more (15.5%). The overall sexual reconviction rate for both samples combined was 5.8% at 2 years, and 17.5% at 6 years or more. CONCLUSIONS: The sexual reconviction rate for incarcerated sexual offenders is higher than that of non-incarcerated sexual offenders. The UK sexual reconviction rates were comparable with European and North American studies.  相似文献   
8.
The aims of this study were (a) to determine whether Spanish children with reading disabilities (RD) show a speech perception deficit and (b) to explore the locus and nature of this perceptive deficit. A group of 29 children with RD, 41 chronological age-matched controls, and 27 reading ability-matched younger controls were tested on tasks of speech perception. The effect of linguistic unit (word vs. syllable) and type of phonetic contrast (voicing, place and manner of articulation) were analyzed in terms of the number of errors and the response time. The results revealed a speech perception deficit in Spanish children with RD that was independent of the type of phonetic contrast and of linguistic unit.  相似文献   
9.
OBJECTIVE: To show how the results of research on children's memory, communicative skills, social knowledge, and social tendencies can be translated into guidelines that improve the quality of forensic interviews of children. METHOD: We review studies designed to evaluate children's capacities as witnesses, explain the development of the structured NICHD Investigative Interview Protocol, and discuss studies designed to assess whether use of the Protocol enhances the quality of investigative interviews. RESULTS: Controlled studies have repeatedly shown that the quality of interviewing reliably and dramatically improves when interviewers employ the NICHD Protocol. No other technique has been proven to be similarly effective. CONCLUSIONS: Use of the structured NICHD Protocol improves the quality of information obtained from alleged victims by investigators, thereby increasing the likelihood that interventions will be appropriate.  相似文献   
10.
OBJECTIVES: The study was designed to explore whether the credibility of children's statements regarding their alleged experiences of child sexual abuse could be assessed in a more valid and reliable way when investigative interviews were conducted using the NICHD protocol rather than in an unstructured manner. METHODS: Forty-two experienced Israeli youth investigators each assessed the credibility of allegations of sexual abuse made by alleged victims of sexual abuse when interviewed either with or without the protocol. Half of the alleged incidents were judged likely to have happened ("plausible") on the basis of independent evidence, while half were deemed unlikely to have happened ("implausible"). RESULTS: More non-protocol than protocol interviews were rated as "No judgment possible" rather than either credible or incredible. Allegations made in protocol interviews were more accurately rated as credible or incredible when they were either plausible or implausible, respectively, than those made in non-protocol statements. Levels of inter-rater reliability were also higher when protocol interviews were rated. The differences were significant only for plausible cases, however. CONCLUSIONS: The use of the NICHD protocol facilitated the assessment of credibility by child investigators although incredible allegations (those describing incidents that were unlikely to have happened) remained difficult to detect, even when the protocol was used.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号