首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   111篇
  免费   3篇
教育   55篇
科学研究   46篇
体育   5篇
综合类   1篇
信息传播   7篇
  2022年   1篇
  2020年   3篇
  2019年   4篇
  2018年   15篇
  2017年   8篇
  2016年   7篇
  2015年   7篇
  2014年   10篇
  2013年   8篇
  2012年   6篇
  2011年   5篇
  2010年   4篇
  2009年   2篇
  2008年   3篇
  2007年   4篇
  2005年   6篇
  2003年   2篇
  2002年   1篇
  1996年   1篇
  1990年   2篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1984年   1篇
  1983年   2篇
  1982年   3篇
  1981年   2篇
  1973年   1篇
  1963年   2篇
  1961年   1篇
排序方式: 共有114条查询结果,搜索用时 62 毫秒
71.
72.
European Journal of Psychology of Education - Theoretical developments in second or foreign language motivation research have led to a better understanding of the convoluted nature of motivation in...  相似文献   
73.
Bug reports are an essential part of a software project's life cycle since resolving them improves the project's quality. When a new bug report is received, developers usually need to reproduce the bug and perform code review to locate the bug and assign it to be fixed. However, the huge number of bug reports and the increasing size of software projects make this process tedious and time-consuming. To solve this issue, bug localization techniques try to rank all the source files of a project with respect to how likely they are to contain a bug. This process reduces the search space of source files and helps developers to find relevant source files quicker. In this paper, we propose a multi-component bug localization approach that leverages different textual properties of bug reports and source files as well as the relations between previously fixed bug reports and a newly received one. Our approach uses information retrieval, textual matching, stack trace analysis, and multi-label classification to improve the performance of bug localization. We evaluate the performance of the proposed approach on three open source software projects (i.e., AspectJ, SWT, and ZXing) and the results show that it can rank appropriate source files for more than 52% of bugs by recommending only one source file and 78% by recommending ten files. It also improves the MRR and MAP values compared to several existing state-of-the-art bug localization approaches.  相似文献   
74.
This experimental project investigated the reliability and validity of rubrics in assessment of students’ written responses to a social science “writing prompt”. The participants were asked to grade one of the two samples of writing assuming it was written by a graduate student. In fact both samples were prepared by the authors. The first sample was well written in terms of sentence structure, spelling, grammar, and punctuation; however, the author did not fully answer the question. The second sample fully answered each part of the question, but included multiple errors in structure, spelling, grammar and punctuation. In the first experiment, the first sample was assessed by participants once without a rubric and once with a rubric. In the second experiment, the second sample was assessed by participants once without a rubric and once with a rubric. The results showed that raters were significantly influenced by mechanical characteristics of students’ writing rather than the content even when they used a rubric. Study results also indicated that using rubrics may not improve the reliability or validity of assessment if raters are not well trained on how to design and employ them effectively.  相似文献   
75.
Communication technology is changing things. Language is no exception. Some language researchers argue that language is deteriorating due to increased use in electronic communication. The present paper investigated 100 randomly selected electronic mails (e-mails) and 50 short messaging system (SMS) messages of a representative sample of international students in University Putra Malaysia (UPM) to find out the impact of these two specific modes of electronic communication on written language use. The e-mails from UPM International Students Association (UPM-ISA) yahoo group were content analyzed. A non-probability convenience sampling was used to select the 50 short message services sent to the researcher about different subject matters by Malaysian and international students at UPM. Then, they were also content analyzed. The results indicated that the language used in students' e-mails and SMS messaging was full of spoken-like spelling, unconventional use of punctuation and abbreviations, and ungrammatical sentences. However, the more in-depth content analysis of the data revealed that the written language is being creatively adapted, developed, and enhanced to suit the conditions of the electronic communication age. Syntactical and lexical reductions are just strategies used to reduce effort, time and space.  相似文献   
76.
In the Iranian higher education system, including engineering education, effective implementation of cooperative learning is difficult because classrooms are usually crowded and the students never had a formal group working background in their previous education. In order to achieve the benefits of cooperative learning in this condition, this paper proposes a combination of cooperative learning and inquiry method. The method is implemented by grouping students in a way that the learning procedure is done in non-official class sessions by each group, while the inquiry method is done in the regular programmed class sessions. The study is performed in Islamic Azad University and the methods are implemented in two engineering economic classes with different numbers of students in each working group. The results are compared with a control class in which traditional teaching style is implemented. The results of analysis show simultaneous improvement of learning and behavioural attitudes of the students with cooperative learning plus inquiry method in the classroom with a fewer number of students in each working group.  相似文献   
77.
78.
This study explored the impact of explicit teaching of reading strategies on English-as-a-foreign-language (EFL) students?? reading performance in Iran. The study employed a questionnaire adapted from Chamot and O??Malley??s (1994) cognitive and metacognitive strategies framework. To test the effects of explicit teaching of cognitive and metacognitive reading strategies on reading performance and strategy transfer, the study has a quasi-experimental design involving a contrast group and a treatment group, with whom an intervention program was implemented. The treatment group achieved significantly better results than the contrast group after four months of strategy-based instruction. Results of paired-sample t-tests and independent t-tests and effect size showed that reading comprehension and reading strategy use improved with strategy instruction. Moreover, SPANOVA analyses showed that the participants in the treatment group performed better than those in the contrast group in reading comprehension and reading strategy transfer. Results also showed that strategy instruction contributed to autonomous reading behaviors. Recommendations for further research are discussed.  相似文献   
79.
The problem of finite-time stability for linear discrete-time systems with time-varying delay is studied in this paper. In order to deal with the time delay, the original system is firstly transformed into two interconnected subsystems. By constructing a delay-dependent Lyapunov–Krasovskii functional and using a two-term approximation of the time-varying delay, sufficient conditions of finite-time stability are derived and expressed in terms of linear matrix inequalities (LMIs). The derived stability conditions can be applied into analyzing the finite-time stability and deriving the maximally tolerable delay. Compared with the existing results on finite-time stability, the derived stability conditions are less conservative. In addition, for the stabilization problem, we design the state-feedback controller. Finally, numerical examples are used to illustrate the effectiveness of the proposed method.  相似文献   
80.
Despite the critical role of individuals’ perceived security in an online environment, previous research has not attempted to comprehensively study the influences and interrelations between the determinants of online individuals’ perceived security. This research employs five theories to examine the interrelations that might exist between the antecedents of individuals’ perceived security in online environment in Malaysia. It is the first attempt to empirically examine the interrelations of the confidentiality related factors identified in the literature which is a significant original contribution. A questionnaire was the primary research methodology and structural equation modeling was employed to test the hypotheses. The findings suggest that individuals’ perceptions about security are significantly influenced by their perceived technical protection while technical protection was found to be influenced by website design features. Moreover, it was found that individuals’ perceptions toward internally provided assurances are highly influenced by externally provided assurances. However, the results found no significant relations between internally and externally provided assurances about a website's security. The findings imply that e-retailers should launch well-designed websites and communicate the technical protection capabilities of their websites to address individuals’ security concerns. The results also suggest that e-traders should consider the factors influencing individuals’ security perceptions when designing/developing their websites.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号