首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   111篇
  免费   3篇
教育   55篇
科学研究   46篇
各国文化   1篇
体育   5篇
信息传播   7篇
  2022年   1篇
  2020年   3篇
  2019年   4篇
  2018年   16篇
  2017年   8篇
  2016年   7篇
  2015年   7篇
  2014年   9篇
  2013年   8篇
  2012年   6篇
  2011年   5篇
  2010年   4篇
  2009年   2篇
  2008年   3篇
  2007年   4篇
  2005年   6篇
  2003年   2篇
  2002年   1篇
  1996年   1篇
  1990年   2篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1984年   1篇
  1983年   2篇
  1982年   3篇
  1981年   2篇
  1973年   1篇
  1963年   2篇
  1961年   1篇
排序方式: 共有114条查询结果,搜索用时 15 毫秒
111.
Israel’s public diplomacy efforts in the U.S. are aimed at garnering American public support for Israeli foreign policy. This study aims to identify the networks of Israeli public diplomacy toward the United States. Using the theoretical frameworks of networked public diplomacy and strategic narrative, the authors try to understand how network strategy is used and information is circulated to create a strategic narrative. Therefore, the two methods of social network analysis and qualitative content analysis are applied to identify the networks of Israeli public diplomacy in the United States and the content produced by it. The study finds that in Israel’s public diplomacy model, the networking method stands in contrast to its government-oriented strategic narrative. Thus, new forms of communication are applied to conduct old strategies. The research identifies four types of actors who apply new public diplomacy techniques and dissects the strategic narrative they employ to affect the American public in the service of Israeli interests. Despite the effort to apply new forms of public diplomacy, strategic narrative production and dissemination remain highly governmental and closed, which is indicative of the persistence of old forms of public diplomacy.  相似文献   
112.
Recent scholarship references indicate that integration of the student body can result in an enhanced learning experience for students and also greater satisfaction. This paper reports the results of a case study whereby mechanical engineering students studying at a newly established branch campus in Dubai of a British university were exposed to vertical and horizontal integration. Different activities have been embedded to ensure that students integrated and worked together with their peers and colleagues at different levels. The implemented processes and practices led to improved academic achievements, which were better than those of a similar cohort of students where no effort had been made to integrate. The analysis revealed that cooperative learning and the degree of academic support provided by teachers are positively and directly correlated with academic as well as the students’ own sense of personal achievement. The results are discussed in light of previous research and with reference to the cultural context of the study.  相似文献   
113.
Recently, higher education systems seek to use network-based and Internet-based information technologies in education, teaching and learning. E-learning in Iran higher education system has been started since 2003, however, its development has been very slow. The present study is a survey research. The participants of the study are faculty members, graduates and PhD students in Agriculture in Bu Ali Sina University. Total number of participants were analyzed (n?=?500). The accuracy of indicators and items in the questionnaire (face validity) has been confirmed by specialists. A questionnaire was used to collect data. Reliability was calculated by using Cronbach Alpha. In this study, Factor analysis is used to achieve the key factors. The results show that deficiency of executives, lack of learners’ motivation, infrastructural barriers, restriction of credit, and software and hardware limitations are the main problems in the development of web-based training. At the end of the article, some recommendations are presented aiming to accelerate electronic training in Iran’s higher education system.  相似文献   
114.
Collaborative filtering (CF) is a popular method for personalizing product recommendations for e-commerce applications. In order to recommend a product to a user and predict that user’s preference, CF utilizes product evaluation ratings of like-minded users. The process of finding like-minded users forms a social network among all users and each link between two users represents an implicit connection between them. Users having more connections with others are the most influential users. Attacking recommender systems is a new issue for these systems. Here, an attacker tries to manipulate a recommender system in order to change the recommendation output according to her wish. If an attacker succeeds, her profile is used over and over again by the recommender system, making her an influential user. In this study, we applied the established attack detection methods to the influential users, instead of the whole user set, to improve their attack detection performance. Experiments were conducted using the same settings previously used to test the established methods. The results showed that the proposed influence-based method had better detection performance and improved the stability of a recommender system for most attack scenarios. It performed considerably better than established detection methods for attacks that inserted low numbers of attack profiles (20–25 %).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号