全文获取类型
收费全文 | 31857篇 |
免费 | 1356篇 |
国内免费 | 25篇 |
出版年
2020年 | 343篇 |
2019年 | 429篇 |
2018年 | 607篇 |
2017年 | 572篇 |
2016年 | 665篇 |
2015年 | 439篇 |
2014年 | 534篇 |
2013年 | 2507篇 |
2012年 | 1005篇 |
2011年 | 1006篇 |
2010年 | 600篇 |
2009年 | 676篇 |
2008年 | 870篇 |
2007年 | 885篇 |
2006年 | 769篇 |
2005年 | 693篇 |
2004年 | 667篇 |
2003年 | 613篇 |
2002年 | 629篇 |
2001年 | 1074篇 |
2000年 | 1062篇 |
1999年 | 787篇 |
1998年 | 339篇 |
1997年 | 314篇 |
1995年 | 322篇 |
1992年 | 633篇 |
1991年 | 602篇 |
1990年 | 580篇 |
1989年 | 554篇 |
1988年 | 545篇 |
1987年 | 492篇 |
1986年 | 493篇 |
1985年 | 539篇 |
1984年 | 446篇 |
1983年 | 409篇 |
1982年 | 335篇 |
1979年 | 485篇 |
1978年 | 343篇 |
1977年 | 316篇 |
1976年 | 327篇 |
1975年 | 370篇 |
1974年 | 448篇 |
1973年 | 472篇 |
1972年 | 411篇 |
1971年 | 347篇 |
1970年 | 325篇 |
1969年 | 343篇 |
1968年 | 430篇 |
1967年 | 379篇 |
1966年 | 362篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
901.
902.
INNATENESS, EXPERIENCE, AND MUSIC PERCEPTION 总被引:2,自引:0,他引:2
903.
904.
Michael D. Gliksman M.P.H. F.A.C.O.M. Allan Kellehear Ph.D. 《Journal of Near-Death Studies》1990,9(1):41-43
Although cerebral anoxia is not thought to be responsible for triggering near-death experiences (NDEs), the issue is not so clear in the case of hypercapnia. Detection of normal blood gases in Michael Sabom's (1982) case study seems to be the major reply to suggestions that hypercapnia may have a causal role in NDEs. We argue, however, that routine arterial measures of blood gases are not a reliable indicator of cerebral levels. 相似文献
905.
Gerald H. Zuk PhD 《Contemporary Family Therapy》1990,12(6):467-476
Learning to be possessed has been described elsewhere by the writer as a form of pathogenic relating begun when children are taught by adults that they will receive a lesser penalty for misbehavior if they can show they were not responsible, such as if it were caused by an evil agent or the Devil. It was suggested that learning to be possessed can be an underlying cause of psychopathology, the delusion of persecution in particular. Two short stories by the distinguished American writer Edgar Allan Poe are examined to develop the formulation of learning to be possessed, especially when it has passed to a delusion of persecution. Two propositions are offered: (1) Where it appears that a family member is murdered by a delusional assailant by accident, it is not an accident; and (2) the delusion of persecution entails a memory loss so that the murderer not only can claim lack of personal responsibility for the act, but also spares himself the guilt of having broken a fundamental taboo. Further comparison is made between learning to be possessed as a cause of delusion, and the psychoanalytic theory in which the defense mechanism of projection is central. In the latter theory, interpretation of the delusion is critical; whereas in the former, interpretation is counterproductive because it merely reinforces the delusion.Probably a note of appreciation is due the writer's daughter Cary, who at age 14 is an expert at badgering her father for help with homework assignments. For several weeks the writer was alternatively pestered and cajoled to help Cary with her Poe Project for high school English which required an essay analyzing the work of a great American writer denigrated by the author as weird by his recollection formed decades earlier. Cary's persistence required the author to consider Poe anew, to recognize his unwarranted earlier prejudice, and to recognize that Poe offered him a gift of understanding regarding a topic about which the author had been thinking for several years, namely that form of pathogenic relating named learning to be possessed. 相似文献
906.
K. Blokker S. Bruin J. Bryden I. Houseman C. Okkerse C. Van der Meer A. P. Verkaik 《Knowledge, Technology, and Policy》1990,3(3):76-83
In this article the perspective shifts to the “upstream” end of the agricultural knowledge and information system (AKIS).
Because knowledge policy and strategic decision-making are not the prerogative of the public sector, organizations such as
cooperative unions and multinational companies are included. After considering the influence of the changing environment on
the nature of the AKIS, the role of knowledge management and policy in the emerging knowledge and information market is examined.
Special attention is given to public and private R&D. The article then looks where information technology (IT) fits in and
what considerations determine strategic investment in IT projects and sustained services. Some of the European experiences
with this strategic investment are evaluated. 相似文献
907.
Despite demonstrations of the utility and cost effectiveness of behavioral programming, such techniques are not commonly employed in psychiatric inpatient settings. Several explanations for this have been proposed, including inadequate levels of training and competence in behavioral programming among prevalent treatment staff. This study employed a multiple choice inventory to assess behavioral knowledge among subjects representing several direct care disciplines commonly found in inpatient psychiatric settings. The results support assertions of relatively low levels of behavioral knowledge among disciplines that are most prevalent in such settings. The implications of these results for initiatives to enhance behavioral knowledge and skills are discussed. 相似文献
908.
Phillip L. Emerson Doris C. Karnisky Carla J. Kastanis 《Behavior research methods》1990,22(2):256-259
Three inexpensive text-to-speech synthesizers are described, intelligibility data from a pilot experiment are reported, and software is offered that has been written to facilitate the phonemic programming of the Heathkit-Votrax synthesizer. 相似文献
909.
910.
C. D. L. Wynne 《Behavior research methods》1990,22(1):27-33
A system of interfaces for the Commodore 64 (C-64) microcomputer for use in the operant laboratory is described. This system frees the experimenter from limitations on the number of I/O lines available on the user port of the C-64 and offers the control of operant chambers for a low cost. Subroutines in machine code to control the interfaces, offering millisecond timing of external events, are presented. A sample BASIC program demonstrates how the subroutines are called from BASIC to run a simple discrimination experiment. 相似文献