全文获取类型
收费全文 | 196篇 |
免费 | 7篇 |
国内免费 | 1篇 |
专业分类
教育 | 90篇 |
科学研究 | 76篇 |
各国文化 | 1篇 |
体育 | 7篇 |
文化理论 | 1篇 |
信息传播 | 29篇 |
出版年
2023年 | 4篇 |
2022年 | 2篇 |
2021年 | 1篇 |
2020年 | 6篇 |
2019年 | 5篇 |
2018年 | 23篇 |
2017年 | 14篇 |
2016年 | 14篇 |
2015年 | 11篇 |
2014年 | 18篇 |
2013年 | 21篇 |
2012年 | 12篇 |
2011年 | 8篇 |
2010年 | 7篇 |
2009年 | 6篇 |
2008年 | 4篇 |
2007年 | 8篇 |
2006年 | 6篇 |
2005年 | 11篇 |
2003年 | 2篇 |
2002年 | 1篇 |
1996年 | 1篇 |
1994年 | 1篇 |
1990年 | 2篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1982年 | 3篇 |
1981年 | 2篇 |
1973年 | 2篇 |
1963年 | 2篇 |
1961年 | 1篇 |
排序方式: 共有204条查询结果,搜索用时 15 毫秒
141.
Mahmood Hussain Shah Hamid Reza Peikari Norjaya M. Yasin 《International Journal of Information Management》2014
Despite the critical role of individuals’ perceived security in an online environment, previous research has not attempted to comprehensively study the influences and interrelations between the determinants of online individuals’ perceived security. This research employs five theories to examine the interrelations that might exist between the antecedents of individuals’ perceived security in online environment in Malaysia. It is the first attempt to empirically examine the interrelations of the confidentiality related factors identified in the literature which is a significant original contribution. A questionnaire was the primary research methodology and structural equation modeling was employed to test the hypotheses. The findings suggest that individuals’ perceptions about security are significantly influenced by their perceived technical protection while technical protection was found to be influenced by website design features. Moreover, it was found that individuals’ perceptions toward internally provided assurances are highly influenced by externally provided assurances. However, the results found no significant relations between internally and externally provided assurances about a website's security. The findings imply that e-retailers should launch well-designed websites and communicate the technical protection capabilities of their websites to address individuals’ security concerns. The results also suggest that e-traders should consider the factors influencing individuals’ security perceptions when designing/developing their websites. 相似文献
142.
The present study investigates English language teaching (ELT) curriculum planning in Iran's Ministry of Education and its implementation by teachers. We studied programme evaluation; needs analysis; the ELT-specific documents; communication channels between planning and practice levels; teacher evaluation and student assessment; interpretation and re-examination of national policies within the Ministry; and the criteria set for ELT material development. Instrumentation included: curriculum documents; interviews with Ministry officials, material developers and headteachers; and teacher questionnaires. Results attested to the lack of any ELT-specific document for material development and absence of research-based needs assessment as the foundation of the programmes. Also, there are no pre-defined linguistic and professional criteria for evaluating teachers, and planning for students' assessment is limited to a set of general guidelines. Moreover, there is neither a programme evaluation nor an ELT evaluation model and national-level policies are not re-examined at planning level. Results also indicate that politico-ideological beliefs of material developers are as important as their expertise and communication channels between planning and practice levels are of a top-down nature. It is argued that the gap between planning and practice results from a highly centralised policymaking process in which local policymakers (i.e. teachers) are not involved. 相似文献
143.
144.
Jajcay's studies(1993; 1994) on the automorphism groups of Cayley maps yielded a new product of groups, which he called, rotary
product. Using this product, we define a hyperoperation ⊙ on the groupSym
e(G), the stabilizer of the identitye∈G in the groupSym(G).
We prove that (Sym
e (G), ⊙) is a hypergroup and characterize the subhypergroups of this hypergroup. Finally, we show that the set of all subhypergroups
ofSym
e (G) constitute a lattice under ordinary join and meet and that the minimal elements of order two of this lattice is a subgroup
ofAut (G). 相似文献
145.
ABSTRACTThis paper analyzes the process of crack saturation, which is fundamental to understanding why panel paintings have survived remarkably well in the uncontrolled environments of historic houses or places of worship for several centuries. The process of crack saturation was analyzed using finite element modeling. A double layer elastic model with fractured overlying paint layer was subjected to uniaxial tension. The critical separation between cracks was determined and compared with patterns observed in real paintings. In addition, the generation and propagation of delamination were studied to elucidate the effect of their propagation on the saturation distance of cracks, as well as the load carrying ability of the paint layer. Contributing modes of crack propagation and their significance are also discussed. The results demonstrate that shearing fracture mode dominates the process of delamination. The impact of crack saturation on the degree of relative humidity variation that is allowable is also discussed. 相似文献
146.
147.
INTRODUCTIONWewillfirstrecallsomealgebraicdefinitionsthatwillbeusedinthepaper.AhyperstructureisasetHtogetherwithafunction·∶H×H→P 相似文献
148.
Liyana Ahmad Afip M. Obaidul Hamid Peter Renshaw 《Globalisation, Societies & Education》2019,17(3):378-393
The Common European Framework of Reference for Languages (CEFR) has emerged as a global policy in language education which has been ‘borrowed’ by nations across the world. This paper presents a critical analysis of Malaysia’s borrowing of the CEFR as part of English language curriculum reform with particular reference to policy motivation and implementation processes as outlined in the English Language Education Roadmap for Malaysia (2015–2025). The analysis draws on Phillips and Ochs’s (2003, “Processes of Policy Borrowing in Education: Some Explanatory and Analytical Devices.” Comparative Education 39 (4): 451–461.) framework for examining educational policy borrowing to highlight challenges as well as prospects of the implementation of the global policy in higher education in Malaysia. 相似文献
149.
Holger Daun Reza Arjmand 《International Review of Education/Internationale Zeitschrift für Erziehungswissenschaft/Revue internationale l'éducation》2005,36(1):403-426
While European education systems fundamentally rest on a rather monolithic world-view, some of them are explicitly oriented
towards Christianity and others are comparatively secular. Apart from this, they differ in the way that they offer opportunities
for Muslim minorities to enjoy a modern and competitive as well as religious-moral education. Principally, there are three
approaches. The first allows private Muslim schools which are neither subsidized nor controlled or regulated by the state.
Other countries require Muslim schools to apply for approval, and such schools are then subsidized and regulated; but they
do not have to teach a national curriculum. In a third group of countries, only schools that teach the national curriculum
are permitted, and they are subsidized and controlled by the state. In the latter case, because Islamic matters are not taught
in these schools, many Muslim parents send their children to non-formal Qur’anic schools in the evening or during weekends.
This study examines some typical arrangements in a number of countries. 相似文献
150.