全文获取类型
收费全文 | 3270篇 |
免费 | 60篇 |
国内免费 | 208篇 |
专业分类
教育 | 1539篇 |
科学研究 | 1007篇 |
各国文化 | 5篇 |
体育 | 58篇 |
综合类 | 68篇 |
文化理论 | 9篇 |
信息传播 | 852篇 |
出版年
2024年 | 2篇 |
2023年 | 26篇 |
2022年 | 65篇 |
2021年 | 98篇 |
2020年 | 140篇 |
2019年 | 84篇 |
2018年 | 84篇 |
2017年 | 83篇 |
2016年 | 49篇 |
2015年 | 111篇 |
2014年 | 223篇 |
2013年 | 224篇 |
2012年 | 227篇 |
2011年 | 245篇 |
2010年 | 204篇 |
2009年 | 243篇 |
2008年 | 243篇 |
2007年 | 245篇 |
2006年 | 200篇 |
2005年 | 185篇 |
2004年 | 175篇 |
2003年 | 132篇 |
2002年 | 90篇 |
2001年 | 63篇 |
2000年 | 38篇 |
1999年 | 21篇 |
1998年 | 10篇 |
1997年 | 7篇 |
1996年 | 4篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1982年 | 1篇 |
排序方式: 共有3538条查询结果,搜索用时 15 毫秒
1.
Although Affirmative Action policies have been enforced in many countries, their consequences are highly understudied, especially in the context of developing economies. Section 12(1)(c) of the Right to Education (RTE) Act enforced in 2009 is the first attempt to introduce affirmative action in primary schools in India. The act requires all private schools to reserve at least twenty five percent seats for children from economically weaker sections. To understand the effect of the act on i) social integration and ii) academic outcomes, we asked 1500 children (grades one to three) from four schools to answer friendship surveys and short tests in Mathematics and English. The schools in our sample vary considerably in constitution and were intentionally chosen to understand the impact of the act in different school settings. The friendship surveys show strong homophily i.e. non-RTE students cite other non-RTE students as friends, while RTE students chose to be friends primarily with other RTE students. Trends in test scores reveal that students admitted under the RTE quota score significantly lower than non-RTE students. However, RTE students who have a higher share of non-RTE friends have better test scores, suggesting that affirmative action may have a positive influence on learning outcomes for RTE children. Further we note that commitment from the school authorities and systematic monitoring and evaluation of the implementation of the act will go a long way in bringing out some of the benefits that this act was designed to achieve. Our findings have important policy implications with respect to ensuring proper implementation of the Section12(1)(c) of the RTE act in schools across the country. 相似文献
2.
《Information processing & management》2023,60(2):103235
Imbalanced sample distribution is usually the main reason for the performance degradation of machine learning algorithms. Based on this, this study proposes a hybrid framework (RGAN-EL) combining generative adversarial networks and ensemble learning method to improve the classification performance of imbalanced data. Firstly, we propose a training sample selection strategy based on roulette wheel selection method to make GAN pay more attention to the class overlapping area when fitting the sample distribution. Secondly, we design two kinds of generator training loss, and propose a noise sample filtering method to improve the quality of generated samples. Then, minority class samples are oversampled using the improved RGAN to obtain a balanced training sample set. Finally, combined with the ensemble learning strategy, the final training and prediction are carried out. We conducted experiments on 41 real imbalanced data sets using two evaluation indexes: F1-score and AUC. Specifically, we compare RGAN-EL with six typical ensemble learning; RGAN is compared with three typical GAN models. The experimental results show that RGAN-EL is significantly better than the other six ensemble learning methods, and RGAN is greatly improved compared with three classical GAN models. 相似文献
3.
Pasquale Del Vecchio Gioconda Mele Valentina Ndou Giustina Secundo 《Information processing & management》2018,54(5):847-860
This paper aims to demonstrate how the huge amount of Social Big Data available from tourists can nurture the value creation process for a Smart Tourism Destination. Applying a multiple-case study analysis, the paper explores a set of regional tourist experiences related to a Southern European region and destination, to derive patterns and opportunities of value creation generated by Big Data in tourism. Findings present and discuss evidence in terms of improving decision-making, creating marketing strategies with more personalized offerings, transparency and trust in dialogue with customers and stakeholders, and emergence of new business models. Finally, implications are presented for researchers and practitioners interested in the managerial exploitation of Big Data in the context of information-intensive industries and mainly in Tourism. 相似文献
4.
5.
AbstractThe Program for Cooperative Cataloging (PCC) has formal relationships with the Library of Congress (LC), Share-VDE, and Linked Data for Production Phase 2 (LD4P2) for work on Bibliographic Framework (BIBFRAME), and PCC institutions have been very active in the exploration of MARC to BIBFRAME conversion processes. This article will review the involvement of PCC in the development of BIBFRAME and examine the work of LC, Share-VDE, and LD4P2 on MARC to BIBFRAME conversion. It will conclude with a discussion of areas for further exploration by the PCC leading up to the creation of PCC conversion specifications and PCC BIBFRAME data. 相似文献
6.
With the creation of interactive tasks that allow students to explore spatial ways of knowing in conjunction with their other ways of knowing the world, we create a space where students can make sense of information as they organize these new ideas into their already existing schema. Through the use of a Common Online Data Analysis Platform (CODAP) and data from Public Use Microdata Areas (PUMA), students can explore the communities in which they live and work, critically examining opportunities and challenges within a defined space. 相似文献
7.
Cross-Company Churn Prediction (CCCP) is a domain of research where one company (target) is lacking enough data and can use data from another company (source) to predict customer churn successfully. To support CCCP, the cross-company data is usually transformed to a set of similar normal distribution of target company data prior to building a CCCP model. However, it is still unclear which data transformation method is most effective in CCCP. Also, the impact of data transformation methods on CCCP model performance using different classifiers have not been comprehensively explored in the telecommunication sector. In this study, we devised a model for CCCP using data transformation methods (i.e., log, z-score, rank and box-cox) and presented not only an extensive comparison to validate the impact of these transformation methods in CCCP, but also evaluated the performance of underlying baseline classifiers (i.e., Naive Bayes (NB), K-Nearest Neighbour (KNN), Gradient Boosted Tree (GBT), Single Rule Induction (SRI) and Deep learner Neural net (DP)) for customer churn prediction in telecommunication sector using the above mentioned data transformation methods. We performed experiments on publicly available datasets related to the telecommunication sector. The results demonstrated that most of the data transformation methods (e.g., log, rank, and box-cox) improve the performance of CCCP significantly. However, the Z-Score data transformation method could not achieve better results as compared to the rest of the data transformation methods in this study. Moreover, it is also investigated that the CCCP model based on NB outperform on transformed data and DP, KNN and GBT performed on the average, while SRI classifier did not show significant results in term of the commonly used evaluation measures (i.e., probability of detection, probability of false alarm, area under the curve and g-mean). 相似文献
8.
The implementation of digital contact tracing applications around the world to help reduce the spread of the COVID-19 pandemic represents one of the most ambitious uses of massive-scale citizen data ever attempted. There is major divergence among nations, however, between a “privacy-first” approach which protects citizens’ data at the cost of extremely limited access for public health authorities and researchers, and a “data-first” approach which stores large amounts of data which, while of immeasurable value to epidemiologists and other researchers, may significantly intrude upon citizens’ privacy. The lack of a consensus on privacy protection in the contact tracing process creates risks of non-compliance or deliberate obfuscation from citizens who fear revealing private aspects of their lives – a factor greatly exacerbated by recent major scandals over online privacy and the illicit use of citizens’ digital information, which have heightened public consciousness of these issues and created significant new challenges for any collection of large-scale public data. While digital contact tracing for COVID-19 remains in its infancy, the lack of consensus around best practices for its implementation and for reassuring citizens of the protection of their privacy may already have impeded its capacity to contribute to the pandemic response. 相似文献
9.
Brady D. Lund 《Public Services Quarterly》2020,16(2):112-123
AbstractThis article discusses the use of R programing language for executing a sentiment analysis of tweets pertaining to library topics. This discussion is situated within the literature of marketing and management sciences, which is employing methods of machine learning and business intelligence to make informed decision-making, and library administration, which has expressed great interest in social media engagement within its literature but has yet to adopt these types of analysis. Presented in this article is a sample code with instructions on how users may execute it within R to retrieve and analyze tweets relevant to library services. Two examples created using the code (analysis of top librarians’ tweets and analysis of posts about major book publishers) are used to demonstrate the functionality of the code. The code presented in this article may be used by libraries to analyze tweets about their library and library-related topics, which, in turn, may inform management and marketing design. 相似文献
10.
在大数据视域下,以档案管理理论和信息系统安全理论为基础,参考国家相关法规及标准,结合档案管理工作实务,研究当下档案管理工作中的风险,在此基础上初步构建起档案安全管理体系,并对可引入该体系的实用技术进行分析。 相似文献