首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3250篇
  免费   41篇
  国内免费   55篇
教育   2521篇
科学研究   430篇
各国文化   4篇
体育   43篇
综合类   212篇
文化理论   4篇
信息传播   132篇
  2023年   25篇
  2022年   48篇
  2021年   55篇
  2020年   80篇
  2019年   72篇
  2018年   25篇
  2017年   40篇
  2016年   33篇
  2015年   96篇
  2014年   237篇
  2013年   250篇
  2012年   280篇
  2011年   271篇
  2010年   225篇
  2009年   192篇
  2008年   197篇
  2007年   231篇
  2006年   222篇
  2005年   190篇
  2004年   153篇
  2003年   113篇
  2002年   101篇
  2001年   109篇
  2000年   49篇
  1999年   12篇
  1998年   11篇
  1997年   8篇
  1996年   5篇
  1995年   6篇
  1994年   4篇
  1992年   2篇
  1991年   2篇
  1989年   2篇
排序方式: 共有3346条查询结果,搜索用时 31 毫秒
1.
“说课”是授课者在有限的时间内,将一节体育课的教学内容、方法,课的组织形式、练习步骤以及场地、器材等运用情况,用简练准确的语言并配合清晰、简单的动作示范向听课者展现出来。实习生课前采用“说课”,能使各教学环节在头脑中加深印象,加快向教师角色意识转换的速度,有利于教学基本功的掌握,此方法具有可操作性和实用性。  相似文献   
2.
构建网络安全防护体系   总被引:1,自引:0,他引:1  
随着计算机技术和通信技术的发展,计算机网络将日益成为工业、农业和国防等方面的重要信息交换手段,渗透到社会生活的各个领域.网络安全问题日益突出,为了提高网络的整体安全水平必须全方位的构建网络安全防护体系,本文介绍网络安全防护体系的构建过程,并描述网络安全防护体系结构.  相似文献   
3.
In the cultural heritage area, it is of fundamental importance to characterize and classify the conservation state of the materials constituting ancient monuments, in order to study and monitor their decay. Generally, the decay diagnosis is provided by “naked eye” analysis done by expert scientists “walking around” the artifact and recording the conservation state of each individual element they observe. In this paper, a color image segmentation approach, based on histogram threshold and edge detection techniques is presented, to extract degradation regions, characterized by holes or cavities, from color images of stone-materials. The goal is to provide an aid to the decay diagnosis by segmenting degraded regions from color images, computing quantitative data, such as the area and perimeter of the extracted zones, and processing qualitative information, such as various levels of depth detected into the same zones. Since color is a powerful tool in the distinction between objects, a segmentation technique based on color, instead of intensity only, has been used to provide a clearer discrimination between regions. The study case concerns the impressive remains of the Roman Theatre in the city of Aosta (Italy). In particular, we have processed and analyzed some color images of the theatre puddingstones, acquired by a camera.  相似文献   
4.
介绍一种基于红外成像技术的金属焊接质量的无损检测方法.首先介绍了检测的基本原理和检测装置,然后详细给出了以边缘检测为基础的缺陷检测方法及检测结果.最后通过比较说明,利用红外成像技术对金属焊接质量进行无损检测是一种很有效的方法.  相似文献   
5.
跨越不同文化背景的交际常会发生故障 ,使交际双方产生误解其原因不仅限于发音、语法和词汇等语言各方面 ,还有其它如文化背景的原因 ,影响了有效交际 ,本文就此进行了初步探讨  相似文献   
6.
双目相机虽然能通过算法生成密集的深度数据,但其在精度上与激光雷达生成的深度数据有着较大的差距,特别是在纹理不明显的区域。针对这种现象,尝试使用激光雷达的精确点云来排除由双目相机产生的pseudo-LiDAR数据中与之差别较大的部分点,然后将优化后的pseudo-LiDAR用以进行三维物体检测。实验结果显示,将pseudo-LiDAR数据中的不准确点(坏点)排除,有助于提高检测准确率,最多可提高21.02%。因此,如何不依赖激光雷达数据来排除pseudo-LiDAR点云中的坏点是进一步提高双目相机系统检测准确率的关键。  相似文献   
7.
Voice assistants are software agents that can interpret human speech and respond via synthesized voices. Apple’s Siri, Amazon’s Alexa, Microsoft’s Cortana, and Google’s Assistant are the most popular voice assistants and are embedded in smartphones or dedicated home speakers. Users can ask their assistants questions, control home automation devices and media playback via voice, and manage other basic tasks such as email, to-do lists, and calendars with verbal commands. This column will explore the basic workings and common features of today’s voice assistants. It will also discuss some of the privacy and security issues inherent to voice assistants and some potential future uses for these devices. As voice assistants become more widely used, librarians will want to be familiar with their operation and perhaps consider them as a means to deliver library services and materials.  相似文献   
8.
Test security is not an end in itself; it is important because we want to be able to make valid interpretations from test scores. In this article, I propose a framework for comprehensive test security systems: prevention, detection, investigation, and resolution. The article discusses threats to test security, roles and responsibilities, rigorous training for everyone involved in testing, and an evaluation of current practices in test security. I call on everyone responsible for testing programs—the Association of Test Publishers, Council of Chief State School Officers, National Council on Measurement in Education, U.S. Department of Education, and state assessment program managers, their vendors, and the research community—to collaborate on guidelines and practices for security violation prevention, detection, investigation, and resolution.  相似文献   
9.
重复率低却存在抄袭的稿件,其原因可能为单一的检测系统存在漏洞,新发表的论文上传数据库存在时间差,作者对稿件的有意识“修饰”,以及网络时代造假手段多样化.为此,文中提出以下措施:使用多种数据库进行文字检测,从查重报告中发现问题,建立有效的审稿专家数据库、网站教育和警示,充分利用网络资源,加快稿件处理进程,增强编辑的责任意识等,以利于更好地防范学术不端行为.  相似文献   
10.
This paper proposes a learning-based method for text detection and text segmentation in natural scene images. First, the input image is decomposed into multiple connected-components (CCs) by Niblack clustering algorithm. Then all the CCs including text CCs and non-text CCs are verified on their text features by a 2-stage classification module, where most non-text CCs are discarded by an attentional cascade classifier and remaining CCs are further verified by an SVM. All the accepted CCs are output to result in text only binary image. Experiments with many images in different scenes showed satisfactory performance of our proposed method.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号