全文获取类型
收费全文 | 302篇 |
免费 | 5篇 |
国内免费 | 12篇 |
专业分类
教育 | 206篇 |
科学研究 | 50篇 |
各国文化 | 4篇 |
体育 | 14篇 |
综合类 | 10篇 |
信息传播 | 35篇 |
出版年
2023年 | 3篇 |
2022年 | 6篇 |
2021年 | 10篇 |
2020年 | 5篇 |
2019年 | 4篇 |
2018年 | 7篇 |
2017年 | 7篇 |
2016年 | 7篇 |
2015年 | 8篇 |
2014年 | 24篇 |
2013年 | 39篇 |
2012年 | 25篇 |
2011年 | 18篇 |
2010年 | 6篇 |
2009年 | 24篇 |
2008年 | 19篇 |
2007年 | 16篇 |
2006年 | 21篇 |
2005年 | 23篇 |
2004年 | 10篇 |
2003年 | 2篇 |
2002年 | 7篇 |
2001年 | 7篇 |
2000年 | 3篇 |
1999年 | 3篇 |
1998年 | 2篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1991年 | 2篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 1篇 |
排序方式: 共有319条查询结果,搜索用时 31 毫秒
1.
论定向越野运动及其形式和特点 总被引:10,自引:0,他引:10
对定向越野运动的界定及其开展、定向越野运动的形式、开展定向越野运动的意义等进行了探讨。 相似文献
2.
基于跨域名Cookie技术实现电子资源校外访问系统的设计与应用 总被引:3,自引:0,他引:3
介绍山东大学图书馆开发专用软件,采用跨域名Cookie技术,实现基于Web电子资源校外访问的统一身份认证,替代代理服务器和VPN方式,采用独享带宽的实现方式,解决网络瓶颈问题。 相似文献
3.
4.
Meng Deng Sisi Wang Wenjun Guan Yan Wang 《International Journal of Inclusive Education》2017,21(4):416-427
The aim of this study was to develop and validate an instrument of inclusive teachers’ competencies for teaching students with special educational needs in China. Data were obtained from a preliminary and large-scale investigation in Beijing. The primary analyses included exploratory factor analysis and confirmatory factor analysis. The findings indicated that Chinese inclusive teachers’ competency is underpinned by four factors: teaching and instruction; communication and cooperation; attitudes and beliefs; and reflection and development. The four-factor model was obtained with satisfactory reliability and validity. The validated questionnaire generated a theoretical understanding of inclusive education teachers’ competency in China. In addition, the findings of the study provided knowledge that will allow for the development of professional standards and teacher education programmes for inclusive education. 相似文献
5.
在横断科学的背景下,系统地研究了不确定性的数学理论问题,提出并充分论证了广义近似空间理论作为解决不精确性、不完备和不确定性问题的新数学工具.文中以信息科学和复杂经济分析为例进行了佐证. 相似文献
6.
随着无线频谱资源的日益紧张,移动通信系统转向利用数字波束赋形技术来提高系统的容量。数字波束赋形技术的关键,是利用赋形权值优化算法对赋形权值进行寻优操作。常用的权值优化算法有遗传算法、粒子群优化算法和交叉熵算法。本文对三种优化算法应用时的关键步骤进行了总结,比较了三种算法的性能,最后对算法应用于时分移动通信系统存在的问题进行了分析。 相似文献
7.
Che-Yu Kuo Tsung-Hau Jen Ying-Shao Hsu 《International Journal of Science Education》2013,35(14):2326-2357
The potential of computer-based assessments for capturing complex learning outcomes has been discussed; however, relatively little is understood about how to leverage such potential for summative and accountability purposes. The aim of this study is to develop and validate a multimedia-based assessment of scientific inquiry abilities (MASIA) to cover a more comprehensive construct of inquiry abilities and target secondary school students in different grades while this potential is leveraged. We implemented five steps derived from the construct modeling approach to design MASIA. During the implementation, multiple sources of evidence were collected in the steps of pilot testing and Rasch modeling to support the validity of MASIA. Particularly, through the participation of 1,066 8th and 11th graders, MASIA showed satisfactory psychometric properties to discriminate students with different levels of inquiry abilities in 101 items in 29 tasks when Rasch models were applied. Additionally, the Wright map indicated that MASIA offered accurate information about students’ inquiry abilities because of the comparability of the distributions of student abilities and item difficulties. The analysis results also suggested that MASIA offered precise measures of inquiry abilities when the components (questioning, experimenting, analyzing, and explaining) were regarded as a coherent construct. Finally, the increased mean difficulty thresholds of item responses along with three performance levels across all sub-abilities supported the alignment between our scoring rubrics and our inquiry framework. Together with other sources of validity in the pilot testing, the results offered evidence to support the validity of MASIA. 相似文献
8.
9.
高职院校的网络安全类课程教学中,需要学生既具有扎实的基础理论知识,又要求在教学中给学生提供一个模拟或者真实的操作环境帮助学生全面的掌握网络安全知识。如何防范跨站脚本攻击是当前网络安全工作中的一个重要课题,本文结合了日常教学的经验,在详细分析跨站脚本攻击原理的基础上,在php+mysql环境上搭建出一个真实的实验环境,帮助学习者深刻理解跨站脚本攻击的相关知识,并学会如何进行有效防范。 相似文献
10.