首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   385篇
  免费   11篇
教育   324篇
科学研究   8篇
各国文化   2篇
体育   18篇
综合类   1篇
信息传播   43篇
  2024年   1篇
  2023年   6篇
  2022年   5篇
  2021年   10篇
  2020年   16篇
  2019年   12篇
  2018年   23篇
  2017年   25篇
  2016年   29篇
  2015年   7篇
  2014年   24篇
  2013年   75篇
  2012年   15篇
  2011年   17篇
  2010年   11篇
  2009年   8篇
  2008年   19篇
  2007年   5篇
  2006年   6篇
  2005年   5篇
  2004年   6篇
  2003年   7篇
  2002年   7篇
  2001年   6篇
  2000年   7篇
  1999年   4篇
  1998年   1篇
  1997年   4篇
  1995年   2篇
  1994年   3篇
  1993年   2篇
  1992年   1篇
  1991年   2篇
  1990年   1篇
  1989年   5篇
  1988年   1篇
  1987年   2篇
  1986年   1篇
  1985年   1篇
  1983年   2篇
  1982年   4篇
  1981年   2篇
  1980年   2篇
  1975年   1篇
  1926年   1篇
  1921年   1篇
  1908年   1篇
排序方式: 共有396条查询结果,搜索用时 31 毫秒
311.
312.
313.
This observational study addressed a critical gap in the understanding of the precursors of infant attachment by examining whether a new conceptualization of maternal caregiving behavior, secure base provision (SBP), explained variance in attachment above and beyond variance explained by sensitivity. Participants included 83 low-socioeconomic status (SES), 4.5-month-old infants (56% male) and their mothers. Infant–mother dyads completed laboratory tasks at 4.5 months and three 30-min home visits between 7 and 9 months, then returned to the laboratory at 12 months for an attachment assessment. Maternal sensitivity did not significantly predict infant attachment security. SBP significantly predicted infant attachment, over and above sensitivity, with an effect size eight times larger than that of sensitivity in meta-analytic findings for low-SES families.  相似文献   
314.
315.
The increasing use of cyberspace as a social networking forum creates a new medium for youth to become victims of peer aggression. This study used factor analysis techniques to confirm whether survey questions about frequency of cyber victimization formed a distinct latent construct from questions about relational and overt victimization information in a large (N = 1,665) sample of middle school students. A secondary goal was to relate experiences of cyber victimization to symptoms of depression and social anxiety. Results indicate that cyber victimization is separate latent factor from overt and relational victimization. Experiences of cyber victimization were weakly associated with symptoms of social anxiety, but not depression. These results signify that cyber victimization deserves future empirical and clinical attention. © 2009 Wiley Periodicals, Inc.  相似文献   
316.
This article explores aspects of science and mathematics faculty identities and biographies that mediated their involvement in K-12 service. Faculty expressed five motivations for participating in K-12 service—advancing their research agenda, advocating environmental consciousness, desiring to be involved in their children’s schools, aspiring to improve their pedagogical practices and promoting equity and social justice.  相似文献   
317.
Drawing valid inferences from modern measurement models is contingent upon a good fit of the data to the model. Violations of model‐data fit have numerous consequences, limiting the usefulness and applicability of the model. As Bayesian estimation is becoming more common, understanding the Bayesian approaches for evaluating model‐data fit models is critical. In this instructional module, Allison Ames and Aaron Myers provide an overview of Posterior Predictive Model Checking (PPMC), the most common Bayesian model‐data fit approach. Specifically, they review the conceptual foundation of Bayesian inference as well as PPMC and walk through the computational steps of PPMC using real‐life data examples from simple linear regression and item response theory analysis. They provide guidance for how to interpret PPMC results and discuss how to implement PPMC for other model(s) and data. The digital module contains sample data, SAS code, diagnostic quiz questions, data‐based activities, curated resources, and a glossary.  相似文献   
318.
Drawing valid inferences from item response theory (IRT) models is contingent upon a good fit of the data to the model. Violations of model‐data fit have numerous consequences, limiting the usefulness and applicability of the model. This instructional module provides an overview of methods used for evaluating the fit of IRT models. Upon completing this module, the reader will have an understanding of traditional and Bayesian approaches for evaluating model‐data fit of IRT models, the relative advantages of each approach, and the software available to implement each method.  相似文献   
319.
Abstract

Academic librarians new to the profession, or seasoned with mid-career changes, have questions and challenges as they progress in their professional careers. Often, librarians need answers and guidance beyond a supervisor and may seek help from their peers. These mentor-mentee relationships can happen either informally or formally, within their home library, or across the profession. Many academic libraries have mentorship programs in place, but mentorship is not a standardized practice and seldom is a one-size-fits-all program. The library and information science (LIS) literature contain articles that describe and analyze the value of these mentorship programs from a variety of interesting angles.  相似文献   
320.
The present study investigated the effectiveness of a novel class‐wide intervention, the Classroom Password, for increasing the academic engaged behavior of middle school students. The effectiveness of an independent group contingency was evaluated using a concurrent multiple baseline design across three seventh‐ and eighth‐grade classrooms. Results indicated that the intervention was effective across all three classrooms in increasing students’ academic engagement, or on‐task behavior, as evidenced by visual analysis and moderate to large effect sizes. Decreases in disruptive behavior were also observed across all three classrooms. Off‐task behavior was not substantially affected in any of the three classrooms. The intervention received mixed ratings by the classroom teachers regarding its social validity. Results of the present study suggest that the Classroom Password may be an effective class‐wide intervention for increasing the academically engaged behavior and decreasing the disruptive behavior of middle school students during instructional time.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号