全文获取类型
收费全文 | 5854篇 |
免费 | 84篇 |
国内免费 | 282篇 |
专业分类
教育 | 2632篇 |
科学研究 | 1842篇 |
各国文化 | 14篇 |
体育 | 176篇 |
综合类 | 167篇 |
文化理论 | 13篇 |
信息传播 | 1376篇 |
出版年
2024年 | 1篇 |
2023年 | 25篇 |
2022年 | 73篇 |
2021年 | 147篇 |
2020年 | 173篇 |
2019年 | 115篇 |
2018年 | 103篇 |
2017年 | 104篇 |
2016年 | 83篇 |
2015年 | 170篇 |
2014年 | 410篇 |
2013年 | 440篇 |
2012年 | 447篇 |
2011年 | 491篇 |
2010年 | 366篇 |
2009年 | 424篇 |
2008年 | 407篇 |
2007年 | 432篇 |
2006年 | 402篇 |
2005年 | 378篇 |
2004年 | 291篇 |
2003年 | 244篇 |
2002年 | 165篇 |
2001年 | 115篇 |
2000年 | 72篇 |
1999年 | 45篇 |
1998年 | 27篇 |
1997年 | 22篇 |
1996年 | 11篇 |
1995年 | 5篇 |
1994年 | 4篇 |
1993年 | 4篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1989年 | 6篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 2篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1977年 | 1篇 |
排序方式: 共有6220条查询结果,搜索用时 15 毫秒
1.
Pasquale Del Vecchio Gioconda Mele Valentina Ndou Giustina Secundo 《Information processing & management》2018,54(5):847-860
This paper aims to demonstrate how the huge amount of Social Big Data available from tourists can nurture the value creation process for a Smart Tourism Destination. Applying a multiple-case study analysis, the paper explores a set of regional tourist experiences related to a Southern European region and destination, to derive patterns and opportunities of value creation generated by Big Data in tourism. Findings present and discuss evidence in terms of improving decision-making, creating marketing strategies with more personalized offerings, transparency and trust in dialogue with customers and stakeholders, and emergence of new business models. Finally, implications are presented for researchers and practitioners interested in the managerial exploitation of Big Data in the context of information-intensive industries and mainly in Tourism. 相似文献
2.
3.
4.
AbstractThe Program for Cooperative Cataloging (PCC) has formal relationships with the Library of Congress (LC), Share-VDE, and Linked Data for Production Phase 2 (LD4P2) for work on Bibliographic Framework (BIBFRAME), and PCC institutions have been very active in the exploration of MARC to BIBFRAME conversion processes. This article will review the involvement of PCC in the development of BIBFRAME and examine the work of LC, Share-VDE, and LD4P2 on MARC to BIBFRAME conversion. It will conclude with a discussion of areas for further exploration by the PCC leading up to the creation of PCC conversion specifications and PCC BIBFRAME data. 相似文献
5.
Cross-Company Churn Prediction (CCCP) is a domain of research where one company (target) is lacking enough data and can use data from another company (source) to predict customer churn successfully. To support CCCP, the cross-company data is usually transformed to a set of similar normal distribution of target company data prior to building a CCCP model. However, it is still unclear which data transformation method is most effective in CCCP. Also, the impact of data transformation methods on CCCP model performance using different classifiers have not been comprehensively explored in the telecommunication sector. In this study, we devised a model for CCCP using data transformation methods (i.e., log, z-score, rank and box-cox) and presented not only an extensive comparison to validate the impact of these transformation methods in CCCP, but also evaluated the performance of underlying baseline classifiers (i.e., Naive Bayes (NB), K-Nearest Neighbour (KNN), Gradient Boosted Tree (GBT), Single Rule Induction (SRI) and Deep learner Neural net (DP)) for customer churn prediction in telecommunication sector using the above mentioned data transformation methods. We performed experiments on publicly available datasets related to the telecommunication sector. The results demonstrated that most of the data transformation methods (e.g., log, rank, and box-cox) improve the performance of CCCP significantly. However, the Z-Score data transformation method could not achieve better results as compared to the rest of the data transformation methods in this study. Moreover, it is also investigated that the CCCP model based on NB outperform on transformed data and DP, KNN and GBT performed on the average, while SRI classifier did not show significant results in term of the commonly used evaluation measures (i.e., probability of detection, probability of false alarm, area under the curve and g-mean). 相似文献
6.
The implementation of digital contact tracing applications around the world to help reduce the spread of the COVID-19 pandemic represents one of the most ambitious uses of massive-scale citizen data ever attempted. There is major divergence among nations, however, between a “privacy-first” approach which protects citizens’ data at the cost of extremely limited access for public health authorities and researchers, and a “data-first” approach which stores large amounts of data which, while of immeasurable value to epidemiologists and other researchers, may significantly intrude upon citizens’ privacy. The lack of a consensus on privacy protection in the contact tracing process creates risks of non-compliance or deliberate obfuscation from citizens who fear revealing private aspects of their lives – a factor greatly exacerbated by recent major scandals over online privacy and the illicit use of citizens’ digital information, which have heightened public consciousness of these issues and created significant new challenges for any collection of large-scale public data. While digital contact tracing for COVID-19 remains in its infancy, the lack of consensus around best practices for its implementation and for reassuring citizens of the protection of their privacy may already have impeded its capacity to contribute to the pandemic response. 相似文献
7.
Brady D. Lund 《Public Services Quarterly》2020,16(2):112-123
AbstractThis article discusses the use of R programing language for executing a sentiment analysis of tweets pertaining to library topics. This discussion is situated within the literature of marketing and management sciences, which is employing methods of machine learning and business intelligence to make informed decision-making, and library administration, which has expressed great interest in social media engagement within its literature but has yet to adopt these types of analysis. Presented in this article is a sample code with instructions on how users may execute it within R to retrieve and analyze tweets relevant to library services. Two examples created using the code (analysis of top librarians’ tweets and analysis of posts about major book publishers) are used to demonstrate the functionality of the code. The code presented in this article may be used by libraries to analyze tweets about their library and library-related topics, which, in turn, may inform management and marketing design. 相似文献
8.
在大数据视域下,以档案管理理论和信息系统安全理论为基础,参考国家相关法规及标准,结合档案管理工作实务,研究当下档案管理工作中的风险,在此基础上初步构建起档案安全管理体系,并对可引入该体系的实用技术进行分析。 相似文献
9.
本文通过对电子档案与纸质档案的比较,认为二者各具优劣,互为补充,在未来相当长的阶段将处于并存状态,不能相互取代.并提出了实行"双套制"管理是二者有机结合,扬长避短,最大限度发挥为人类信息存贮和传播提供服务的作用. 相似文献
10.
高校学生欠费的有效管理 总被引:1,自引:0,他引:1
杨美英 《温州职业技术学院学报》2004,4(2):42-43,46
学费收入是高校办学经费的重要来源之一。但由于多种因素的影响,近几年来,各校普遍存在着学生欠费问题,有的已经严重影响了学校的正常办学。本文试图对学生欠费的原因进行剖析,并就如何加强对学生欠费的管理提出了建议。 相似文献