首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   891篇
  免费   7篇
  国内免费   6篇
教育   490篇
科学研究   229篇
各国文化   1篇
体育   6篇
综合类   34篇
文化理论   2篇
信息传播   142篇
  2023年   11篇
  2022年   16篇
  2021年   30篇
  2020年   21篇
  2019年   29篇
  2018年   26篇
  2017年   24篇
  2016年   23篇
  2015年   31篇
  2014年   46篇
  2013年   71篇
  2012年   55篇
  2011年   49篇
  2010年   52篇
  2009年   40篇
  2008年   53篇
  2007年   79篇
  2006年   56篇
  2005年   60篇
  2004年   43篇
  2003年   27篇
  2002年   20篇
  2001年   18篇
  2000年   12篇
  1999年   4篇
  1998年   2篇
  1996年   1篇
  1994年   1篇
  1993年   1篇
  1992年   2篇
  1989年   1篇
排序方式: 共有904条查询结果,搜索用时 187 毫秒
31.
全球化使得中西跨文化交际日益广泛,中国人对西方人该如何表现出友好与适度的关心才能更加符合西方人的隐私文化?而当一系列典型的"中国式关心"的问题不自然地侵犯了西方人的隐私时,由此产生的文化休克与文化冲突使得文化交际者深思该用何种语言去完成跨文化交际才不至于造成不必要的尴尬和无礼。  相似文献   
32.
Recent controversies surrounding privacy have sparked a move by regulators toward the idea of privacy by design (PbD), a concept pioneered by Ontario Information and Privacy Commissioner Ann Cavoukian. Industry has also started to recognize the importance of taking privacy seriously, with various PbD corporate initiatives currently underway. However, some commentators have criticized PbD for being too vague. Using three case studies and a range of best practice examples of PbD, privacy impact assessments (PIAs), and privacy-enhancing technologies (PETs), this article addresses the gap between the abstract principles of PbD and their operationalization into more concrete implementation guidelines for software engineers.  相似文献   
33.
物联网是什么?物联网不是互联网、传感网、产品电子代码,也不单纯是一种技术应用。物联网将“互联网”和“物”连接在一起,就意味着把破坏性创新引进到当今的信息和通信技术世界。与互联网不同,物联网是物、网络、语义等视角的综合而形成的集网络、应用服务于一体的技术融合系统。在物联网语境中,物联网技术像人一样形成了人为的自主特征。物联网意味着一种潜在的技术异化的环境:个人隐私以多种方式受到威胁。而现有对隐私的制度规约存在诸多的不完备性。  相似文献   
34.
[目的/意义]科学数据已经成为科学研究的重要资源,科研人员面临保护科学数据安全的新挑战。[方法/过程]第一步,从政策、资金、设备、平台、科学数据价值、科研人员专业素养的角度设计问卷;第二步,基于问卷回收数据构建SEM模型;第三步,构建SD模型并对6个维度变化进行动态仿真,探究科学数据安全系统中各因素之间的相互作用关系。[结果/结论]政策、资金、设备、平台、科学数据价值、科研人员专业素养对科学数据安全具有影响,其中政策、平台、科学数据价值对科学数据安全的作用较明显。[局限]考虑的科学安全影响因素尚不全面,还需要进一步优化SD模型。  相似文献   
35.
为了增强图像边缘和纹理以及去除图像噪声,讨论分数阶微积分算子频域特性,提出新型的分数阶微积分算子模板和算法。考虑边缘和纹理具有方向性、空间邻域内像素的关联性以及相邻像素灰度值的相近性,利用3×3模板,在分数阶微分增强时,取中心点4个方向最大值为增强值;在分数阶积分去噪时,将图像分别在8个方向卷积,按照在8个方向卷积结果总和中所占的比例大小进行线性加权,从而得到去噪后的图像。实验结果表明,提出的分数阶微积分算子能明显地增强图像的边缘和纹理信息以及去除图像噪声,并且视觉效果明显。  相似文献   
36.
分析僵尸账号对社交网络的主要威胁及社交网络对僵尸账号的检测机制,针对现有检测机制的不足设计规避检测的策略.使用该策略设计并实现一款利用僵尸账号对社交网络进行攻击的自动化工具.使用该工具对国内外最大的2个社交网站进行攻击测试.实验结果证明了策略与工具的有效性,并证明了社交网络针对僵尸账号的检测机制仍存在不足.  相似文献   
37.
本文试图从教学实践中探索一条解决成人《微积分》教学难的新思路。主要从启发、调动、促进、因材施教,通俗易懂、理论联系实际等几个方面的分析,建立一套实用有效的教学方法。  相似文献   
38.
以微积分为例 ,全面阐述了学生综合能力的内涵及其综合能力的培养  相似文献   
39.
This study reports on an educational development initiative where peer instruction was used instead of traditional lectures in a calculus course for first-year engineering students. The aim of the study was to explore students’ experiences of this method. Data were collected by means of an open-ended questionnaire on two occasions: early and late in the course. The data were analyzed with an inductive content analysis. The findings comprise three qualitatively different ways to experience the interactive teaching method in calculus: (1) enthusiasm, (2) nuanced skepticism and (3) aversion. The categories differed regarding emotional reactions to the teaching, experiences of learning, conceptions of teaching and learning, and experiences of meaningfulness. Many students expressed enthusiasm for learning with peer instruction and noted that the method gave both teachers and students feedback on what students have difficulties with. These students perceived that they were responsible for their own learning. Other students experienced that peer instruction had some advantages and disadvantages, and preferred a mix between traditional lectures and peer instruction sessions. They seemed to believe that teachers and students share responsibility for learning. Some students expressed an aversion for peer instruction and the method seemed to challenge their beliefs of how teaching and learning is best conducted. Our study illustrates that educational development initiatives, even though based on research on student learning, do not benefit all students. One of the major obstacles seems to be that students’ underlying beliefs regarding teaching and learning may be counterproductive to the ideas behind the educational initiative. We suggest that beliefs regarding teaching and learning need to be addressed when introducing new teaching and learning methods.  相似文献   
40.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line question is whether the assessment of these gives sufficient reason for trust.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号