首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11538篇
  免费   246篇
  国内免费   365篇
教育   6440篇
科学研究   2900篇
各国文化   108篇
体育   465篇
综合类   507篇
文化理论   21篇
信息传播   1708篇
  2024年   1篇
  2023年   55篇
  2022年   240篇
  2021年   329篇
  2020年   363篇
  2019年   284篇
  2018年   212篇
  2017年   215篇
  2016年   196篇
  2015年   354篇
  2014年   875篇
  2013年   969篇
  2012年   1046篇
  2011年   742篇
  2010年   551篇
  2009年   716篇
  2008年   721篇
  2007年   812篇
  2006年   893篇
  2005年   917篇
  2004年   429篇
  2003年   436篇
  2002年   322篇
  2001年   186篇
  2000年   81篇
  1999年   64篇
  1998年   26篇
  1997年   16篇
  1996年   27篇
  1995年   9篇
  1994年   5篇
  1993年   3篇
  1992年   9篇
  1991年   2篇
  1990年   2篇
  1989年   2篇
  1988年   1篇
  1987年   1篇
  1986年   2篇
  1985年   8篇
  1984年   6篇
  1983年   5篇
  1982年   5篇
  1981年   3篇
  1980年   1篇
  1979年   2篇
  1978年   5篇
排序方式: 共有10000条查询结果,搜索用时 14 毫秒
1.
The massive number of Internet of Things (IoT) devices connected to the Internet is continuously increasing. The operations of these devices rely on consuming huge amounts of energy. Power limitation is a major issue hindering the operation of IoT applications and services. To improve operational visibility, Low-power devices which constitute IoT networks, drive the need for sustainable sources of energy to carry out their tasks for a prolonged period of time. Moreover, the means to ensure energy sustainability and QoS must consider the stochastic nature of the energy supplies and dynamic IoT environments. Artificial Intelligence (AI) enhanced protocols and algorithms are capable of predicting and forecasting demand as well as providing leverage at different stages of energy use to supply. AI will improve the efficiency of energy infrastructure and decrease waste in distributed energy systems, ensuring their long-term viability. In this paper, we conduct a survey to explore enhanced AI-based solutions to achieve energy sustainability in IoT applications. AI is relevant through the integration of various Machine Learning (ML) and Swarm Intelligence (SI) techniques in the design of existing protocols. ML mechanisms used in the literature include variously supervised and unsupervised learning methods as well as reinforcement learning (RL) solutions. The survey constitutes a complete guideline for readers who wish to get acquainted with recent development and research advances in AI-based energy sustainability in IoT Networks. The survey also explores the different open issues and challenges.  相似文献   
2.
孙宁 《档案管理》2020,(3):12-13
在大数据视域下,以档案管理理论和信息系统安全理论为基础,参考国家相关法规及标准,结合档案管理工作实务,研究当下档案管理工作中的风险,在此基础上初步构建起档案安全管理体系,并对可引入该体系的实用技术进行分析。  相似文献   
3.
4.
Imbalanced sample distribution is usually the main reason for the performance degradation of machine learning algorithms. Based on this, this study proposes a hybrid framework (RGAN-EL) combining generative adversarial networks and ensemble learning method to improve the classification performance of imbalanced data. Firstly, we propose a training sample selection strategy based on roulette wheel selection method to make GAN pay more attention to the class overlapping area when fitting the sample distribution. Secondly, we design two kinds of generator training loss, and propose a noise sample filtering method to improve the quality of generated samples. Then, minority class samples are oversampled using the improved RGAN to obtain a balanced training sample set. Finally, combined with the ensemble learning strategy, the final training and prediction are carried out. We conducted experiments on 41 real imbalanced data sets using two evaluation indexes: F1-score and AUC. Specifically, we compare RGAN-EL with six typical ensemble learning; RGAN is compared with three typical GAN models. The experimental results show that RGAN-EL is significantly better than the other six ensemble learning methods, and RGAN is greatly improved compared with three classical GAN models.  相似文献   
5.
With the creation of interactive tasks that allow students to explore spatial ways of knowing in conjunction with their other ways of knowing the world, we create a space where students can make sense of information as they organize these new ideas into their already existing schema. Through the use of a Common Online Data Analysis Platform (CODAP) and data from Public Use Microdata Areas (PUMA), students can explore the communities in which they live and work, critically examining opportunities and challenges within a defined space.  相似文献   
6.
BackgroundThe current state of knowledge regarding the role of non-offending fathers in supporting their sexually abused children is very scarce.ObjectiveThe objective of this study is to further our understanding of fathers’ roles following disclosure of their children’s sexual abuse (SA) by evaluating fathers’ perceptions of the impact of disclosure on their involvement and support of their children.Participants and methodThis qualitative study relies on individual semi-structured interviews conducted with 17 fathers of allegedly abused children.ResultsInductive thematic analysis first highlighted that some reported a period of disengagement from the child during which they put into question their role and attitudes, followed by a period of re-involvement. This period of difficulties experienced by some fathers in regard to their involvement towards their children was due to either their own important psychological distress, their ambivalence towards their child or even because of feelings of uneasiness experienced during physical contact with them. Despite this, findings indicate the presence of thoughts and attitudes that suggest children are a source of concern for fathers. The four forms of abuse-specific support previously observed among mothers (believing the child, seeking out professional services, protecting him/her from the offender, supporting him/her emotionally) were also observed among fathers. In accordance with the activation theory, a form of support specific to fathers, namely, encouraging the child to open up to and explore the world outside the family, thereby, fostering the child’s self-esteem development, was observed and constitutes a relevant finding.ConclusionClinical and empirical implications are discussed.  相似文献   
7.
8.
In the context of social media, users usually post relevant information corresponding to the contents of events mentioned in a Web document. This information posses two important values in that (i) it reflects the content of an event and (ii) it shares hidden topics with sentences in the main document. In this paper, we present a novel model to capture the nature of relationships between document sentences and post information (comments or tweets) in sharing hidden topics for summarization of Web documents by utilizing relevant post information. Unlike previous methods which are usually based on hand-crafted features, our approach ranks document sentences and user posts based on their importance to the topics. The sentence-user-post relation is formulated in a share topic matrix, which presents their mutual reinforcement support. Our proposed matrix co-factorization algorithm computes the score of each document sentence and user post and extracts the top ranked document sentences and comments (or tweets) as a summary. We apply the model to the task of summarization on three datasets in two languages, English and Vietnamese, of social context summarization and also on DUC 2004 (a standard corpus of the traditional summarization task). According to the experimental results, our model significantly outperforms the basic matrix factorization and achieves competitive ROUGE-scores with state-of-the-art methods.  相似文献   
9.
The implementation of digital contact tracing applications around the world to help reduce the spread of the COVID-19 pandemic represents one of the most ambitious uses of massive-scale citizen data ever attempted. There is major divergence among nations, however, between a “privacy-first” approach which protects citizens’ data at the cost of extremely limited access for public health authorities and researchers, and a “data-first” approach which stores large amounts of data which, while of immeasurable value to epidemiologists and other researchers, may significantly intrude upon citizens’ privacy. The lack of a consensus on privacy protection in the contact tracing process creates risks of non-compliance or deliberate obfuscation from citizens who fear revealing private aspects of their lives – a factor greatly exacerbated by recent major scandals over online privacy and the illicit use of citizens’ digital information, which have heightened public consciousness of these issues and created significant new challenges for any collection of large-scale public data. While digital contact tracing for COVID-19 remains in its infancy, the lack of consensus around best practices for its implementation and for reassuring citizens of the protection of their privacy may already have impeded its capacity to contribute to the pandemic response.  相似文献   
10.
Abstract

This article discusses the use of R programing language for executing a sentiment analysis of tweets pertaining to library topics. This discussion is situated within the literature of marketing and management sciences, which is employing methods of machine learning and business intelligence to make informed decision-making, and library administration, which has expressed great interest in social media engagement within its literature but has yet to adopt these types of analysis. Presented in this article is a sample code with instructions on how users may execute it within R to retrieve and analyze tweets relevant to library services. Two examples created using the code (analysis of top librarians’ tweets and analysis of posts about major book publishers) are used to demonstrate the functionality of the code. The code presented in this article may be used by libraries to analyze tweets about their library and library-related topics, which, in turn, may inform management and marketing design.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号