全文获取类型
收费全文 | 385篇 |
免费 | 11篇 |
专业分类
教育 | 324篇 |
科学研究 | 8篇 |
各国文化 | 2篇 |
体育 | 18篇 |
综合类 | 1篇 |
信息传播 | 43篇 |
出版年
2024年 | 1篇 |
2023年 | 6篇 |
2022年 | 5篇 |
2021年 | 10篇 |
2020年 | 16篇 |
2019年 | 12篇 |
2018年 | 23篇 |
2017年 | 25篇 |
2016年 | 29篇 |
2015年 | 7篇 |
2014年 | 24篇 |
2013年 | 75篇 |
2012年 | 15篇 |
2011年 | 17篇 |
2010年 | 11篇 |
2009年 | 8篇 |
2008年 | 19篇 |
2007年 | 5篇 |
2006年 | 6篇 |
2005年 | 5篇 |
2004年 | 6篇 |
2003年 | 7篇 |
2002年 | 7篇 |
2001年 | 6篇 |
2000年 | 7篇 |
1999年 | 4篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1989年 | 5篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1983年 | 2篇 |
1982年 | 4篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1975年 | 1篇 |
1926年 | 1篇 |
1921年 | 1篇 |
1908年 | 1篇 |
排序方式: 共有396条查询结果,搜索用时 31 毫秒
311.
312.
313.
Susan S. Woodhouse Julie R. Scott Allison D. Hepworth Jude Cassidy 《Child development》2020,91(1):e249-e265
This observational study addressed a critical gap in the understanding of the precursors of infant attachment by examining whether a new conceptualization of maternal caregiving behavior, secure base provision (SBP), explained variance in attachment above and beyond variance explained by sensitivity. Participants included 83 low-socioeconomic status (SES), 4.5-month-old infants (56% male) and their mothers. Infant–mother dyads completed laboratory tasks at 4.5 months and three 30-min home visits between 7 and 9 months, then returned to the laboratory at 12 months for an attachment assessment. Maternal sensitivity did not significantly predict infant attachment security. SBP significantly predicted infant attachment, over and above sensitivity, with an effect size eight times larger than that of sensitivity in meta-analytic findings for low-SES families. 相似文献
314.
315.
Allison G. Dempsey Michael L. Sulkowski Rebecca Nichols Eric A. Storch 《Psychology in the schools》2009,46(10):962-972
The increasing use of cyberspace as a social networking forum creates a new medium for youth to become victims of peer aggression. This study used factor analysis techniques to confirm whether survey questions about frequency of cyber victimization formed a distinct latent construct from questions about relational and overt victimization information in a large (N = 1,665) sample of middle school students. A secondary goal was to relate experiences of cyber victimization to symptoms of depression and social anxiety. Results indicate that cyber victimization is separate latent factor from overt and relational victimization. Experiences of cyber victimization were weakly associated with symptoms of social anxiety, but not depression. These results signify that cyber victimization deserves future empirical and clinical attention. © 2009 Wiley Periodicals, Inc. 相似文献
316.
Identity and biography as mediators of science and mathematics faculty’s involvement in K-12 service
This article explores aspects of science and mathematics faculty identities and biographies that mediated their involvement
in K-12 service. Faculty expressed five motivations for participating in K-12 service—advancing their research agenda, advocating
environmental consciousness, desiring to be involved in their children’s schools, aspiring to improve their pedagogical practices
and promoting equity and social justice. 相似文献
317.
Drawing valid inferences from modern measurement models is contingent upon a good fit of the data to the model. Violations of model‐data fit have numerous consequences, limiting the usefulness and applicability of the model. As Bayesian estimation is becoming more common, understanding the Bayesian approaches for evaluating model‐data fit models is critical. In this instructional module, Allison Ames and Aaron Myers provide an overview of Posterior Predictive Model Checking (PPMC), the most common Bayesian model‐data fit approach. Specifically, they review the conceptual foundation of Bayesian inference as well as PPMC and walk through the computational steps of PPMC using real‐life data examples from simple linear regression and item response theory analysis. They provide guidance for how to interpret PPMC results and discuss how to implement PPMC for other model(s) and data. The digital module contains sample data, SAS code, diagnostic quiz questions, data‐based activities, curated resources, and a glossary. 相似文献
318.
Drawing valid inferences from item response theory (IRT) models is contingent upon a good fit of the data to the model. Violations of model‐data fit have numerous consequences, limiting the usefulness and applicability of the model. This instructional module provides an overview of methods used for evaluating the fit of IRT models. Upon completing this module, the reader will have an understanding of traditional and Bayesian approaches for evaluating model‐data fit of IRT models, the relative advantages of each approach, and the software available to implement each method. 相似文献
319.
AbstractAcademic librarians new to the profession, or seasoned with mid-career changes, have questions and challenges as they progress in their professional careers. Often, librarians need answers and guidance beyond a supervisor and may seek help from their peers. These mentor-mentee relationships can happen either informally or formally, within their home library, or across the profession. Many academic libraries have mentorship programs in place, but mentorship is not a standardized practice and seldom is a one-size-fits-all program. The library and information science (LIS) literature contain articles that describe and analyze the value of these mentorship programs from a variety of interesting angles. 相似文献
320.
Evan H. Dart Keith C. Radley Allison A. Battaglia Komila Dadakhodjaeva Kayla E. Bates Sarah J. Wright 《Psychology in the schools》2016,53(4):416-431
The present study investigated the effectiveness of a novel class‐wide intervention, the Classroom Password, for increasing the academic engaged behavior of middle school students. The effectiveness of an independent group contingency was evaluated using a concurrent multiple baseline design across three seventh‐ and eighth‐grade classrooms. Results indicated that the intervention was effective across all three classrooms in increasing students’ academic engagement, or on‐task behavior, as evidenced by visual analysis and moderate to large effect sizes. Decreases in disruptive behavior were also observed across all three classrooms. Off‐task behavior was not substantially affected in any of the three classrooms. The intervention received mixed ratings by the classroom teachers regarding its social validity. Results of the present study suggest that the Classroom Password may be an effective class‐wide intervention for increasing the academically engaged behavior and decreasing the disruptive behavior of middle school students during instructional time. 相似文献