首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7813篇
  免费   114篇
  国内免费   3篇
教育   5404篇
科学研究   957篇
各国文化   80篇
体育   527篇
综合类   2篇
文化理论   53篇
信息传播   907篇
  2021年   71篇
  2020年   106篇
  2019年   163篇
  2018年   237篇
  2017年   207篇
  2016年   207篇
  2015年   126篇
  2014年   170篇
  2013年   1507篇
  2012年   176篇
  2011年   172篇
  2010年   153篇
  2009年   131篇
  2008年   157篇
  2007年   124篇
  2006年   128篇
  2005年   124篇
  2004年   135篇
  2003年   106篇
  2002年   101篇
  2001年   125篇
  2000年   125篇
  1999年   112篇
  1998年   70篇
  1997年   75篇
  1996年   75篇
  1995年   56篇
  1993年   79篇
  1992年   104篇
  1991年   109篇
  1990年   103篇
  1989年   92篇
  1988年   81篇
  1987年   99篇
  1986年   85篇
  1985年   98篇
  1984年   86篇
  1983年   91篇
  1982年   77篇
  1981年   71篇
  1980年   63篇
  1979年   90篇
  1978年   84篇
  1977年   76篇
  1976年   61篇
  1975年   49篇
  1974年   61篇
  1973年   57篇
  1972年   53篇
  1971年   52篇
排序方式: 共有7930条查询结果,搜索用时 359 毫秒
41.
This study extends instructional communication research on extra-class communication (ECC) by presenting an integrative analysis comparing the explanatory utility of student- and instructor-oriented reasons for student engagement in frequent ECC. Results from 495 college students suggested that student-oriented reasons, specifically the relational and functional student motives, were the only significant, positive predictors of students’ perceptions of frequent ECC engagement. Other student motives (excuse making, participation, sycophancy) and perceptions of instructor approachability did not significantly predict perceived frequency of ECC engagement.  相似文献   
42.
Automatic detection of source code plagiarism is an important research field for both the commercial software industry and within the research community. Existing methods of plagiarism detection primarily involve exhaustive pairwise document comparison, which does not scale well for large software collections. To achieve scalability, we approach the problem from an information retrieval (IR) perspective. We retrieve a ranked list of candidate documents in response to a pseudo-query representation constructed from each source code document in the collection. The challenge in source code document retrieval is that the standard bag-of-words (BoW) representation model for such documents is likely to result in many false positives being retrieved, because of the use of identical programming language specific constructs and keywords. To address this problem, we make use of an abstract syntax tree (AST) representation of the source code documents. While the IR approach is efficient, it is essentially unsupervised in nature. To further improve its effectiveness, we apply a supervised classifier (pre-trained with features extracted from sample plagiarized source code pairs) on the top ranked retrieved documents. We report experiments on the SOCO-2014 dataset comprising 12K Java source files with almost 1M lines of code. Our experiments confirm that the AST based approach produces significantly better retrieval effectiveness than a standard BoW representation, i.e., the AST based approach is able to identify a higher number of plagiarized source code documents at top ranks in response to a query source code document. The supervised classifier, trained on features extracted from sample plagiarized source code pairs, is shown to effectively filter and thus further improve the ranked list of retrieved candidate plagiarized documents.  相似文献   
43.
Libraries have been the key to preserving culture and historic legacy for centuries. One such treasure cataloged in The Pennsylvania State University (Penn State) Libraries is a collection of over 33,000 Sanborn? Fire Insurance Maps. Originally kept safe in metal drawers, the library has embarked on a journey to digitize this abundance of information, combine it with other media such as photographs, and make it accessible through a web interface. Inspired by these efforts, we accessed this information and took it to the next level. Using state of the art 3D modeling and immersive technologies, we created a historic 3D model and immersive experiences of Penn State, exemplarily for the 1922 campus. The resulting experiences can be accessed through the web but also through head mounted displays (HMDs) and mobile phones in combination with VR viewers such as the Google Cardboard. Additionally, they can be used anywhere in the world or on the campus itself as a way to enable remote and in situ experiences and learning. Immersive experiences let us connect to the past, the present and the future, and as such offer value to digital cultural heritage efforts.  相似文献   
44.
45.
ABSTRACT

Employing a number of different standalone programs is a prevalent approach among communication scholars who use computational methods to analyze media content. For instance, a researcher might use a specific program or a paid service to scrape some content from the Web, then use another program to process the resulting data, and finally conduct statistical analysis or produce some visualizations in yet another program. This makes it hard to build reproducible workflows, and even harder to build on the work of earlier studies. To improve this situation, we propose and discuss four criteria that a framework for automated content analysis should fulfill: scalability, free and open source, adaptability, and accessibility via multiple interfaces. We also describe how to put these considerations into practice, discuss their feasibility, and point toward future developments.  相似文献   
46.
The present study aimed to investigate pre-sleep behaviours (including evening electronic device use) and sleep quantity in well-trained athletes. Seventy well-trained athletes (44 females, 26 males) aged 21 ± 4 y from a range of team and individual sports were asked to complete an online sleep diary for 7 days. The sleep diary included questions about pre-sleep behaviours (e.g. napping, caffeine intake), electronic device use in the 2 h prior to bedtime (e.g. type of device and duration of use) and sleep (e.g. time in bed, sleep onset latency). On average, athletes spent 8:20 ± 1:21 h in bed each night. Associations between age, time in bed and sleepiness suggested that younger athletes spent more time in bed (= -0.05, p = 0.001) but felt sleepier (r = -0.32, p < 0.01) than older athletes. On average, athletes mostly used electronic devices for 0–30 min prior to sleep. The use of multiple devices in the evening was associated with more perceived difficulty in falling asleep (= 0.22, p = 0.03), but no associations existed with other sleep variables. In summary, younger athletes may require later start times or improved sleep quality to resolve excessive sleepiness.  相似文献   
47.
A critically transformative education continues to be at the center of Tucson Unified School District's (TUSD) equity and academic excellence mission. Through the use of the Social Transformation paradigm and the lesson learned from the implementation of the Critically Compassionate Intellectualism Model, TUSD once again created a cutting edge transformative, cultural, ethnic, multicultural, equity-based curricula that seeks to stimulate the blossoming intellectual capacities of our students. It presents the opportunity to build foundations and structures of collective and individual agency. Along the lines of agency, it promotes what is called barriorganic intellectualism and the nurturing of gardens of intellectualism (jardines del intelectualismo) that provide opportunities for both the academic and personal transformation of our students.  相似文献   
48.
49.
50.
The aim of this article was to understand how active power is used in squat and countermovement jumps. A simple empirical model comprising a mass, a spring, an active element and a damper, together with an optimisation principle, was used to identify the mechanical factors that maximise performance of jumps without countermovement (squat jumps, SJ) and with countermovement (CMJ). Twelve amateur volleyball players performed SJ from two initial positions and CMJ with two degrees of counterbalancing, while kinematic data were collected (jump height, push-off duration and position of the centre of mass). The model adjusted well to real data of SJ through all the impulse phase, and slightly less adequately at the end of this phase for CMJ. Nevertheless, it provides a satisfactory explanation for the generation and utilisation of active power for both type of jumps. On average, the estimated power of the active elements, the spring, and the damper were greater in the SJ. Based upon the result obtained with this model, we suggest that active power is best evaluated with SJ. The reason for this is that, during this kind of jump, the elements associated with the damper consume much of the energy produced by the active elements. The participation of the elements that consume the energy generated by the active elements is less in CMJ than in SJ, allowing for a better utilisation of this energy. In this way it is possible to achieve a better performance in CMJ with less active power.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号