首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5407篇
  免费   493篇
  国内免费   484篇
  2024年   6篇
  2023年   110篇
  2022年   95篇
  2021年   136篇
  2020年   257篇
  2019年   314篇
  2018年   265篇
  2017年   300篇
  2016年   229篇
  2015年   166篇
  2014年   209篇
  2013年   691篇
  2012年   184篇
  2011年   165篇
  2010年   181篇
  2009年   144篇
  2008年   202篇
  2007年   279篇
  2006年   298篇
  2005年   305篇
  2004年   247篇
  2003年   221篇
  2002年   176篇
  2001年   95篇
  2000年   81篇
  1999年   65篇
  1998年   44篇
  1997年   35篇
  1996年   27篇
  1995年   26篇
  1994年   23篇
  1993年   22篇
  1992年   6篇
  1991年   9篇
  1990年   6篇
  1989年   9篇
  1987年   3篇
  1985年   65篇
  1984年   69篇
  1983年   44篇
  1982年   49篇
  1981年   51篇
  1980年   51篇
  1979年   48篇
  1978年   79篇
  1977年   64篇
  1976年   71篇
  1975年   57篇
  1974年   53篇
  1973年   49篇
排序方式: 共有6384条查询结果,搜索用时 31 毫秒
1.
Adolescence is a high-risk period for body image disturbance and appearance concerns. In a cascade model, we examined interrelations of body dysmorphic symptoms (BDS) with appearance rejection sensitivity (ARS) and tested gender moderation. Participants were 397 Australian adolescents (T1 Mage = 11.7, SD = 0.91; 56% girls) who completed six surveys over 4 years. In a random-intercept cross-lag model, two (of five possible) paths showed ARS predicted higher subsequent BDS, and three (of five possible) paths showed BDS predicted higher subsequent ARS. Girls reported more BDS and ARS than boys, and random intercepts of BDS and ARS were correlated with the correlation stronger in girls than boys. Cross-lag BDD-ARS associations over the six waves were not significantly moderated by gender. Overall, girls are at higher risk of appearance concerns than boys, but BDD-ARS cascade effects do not differ between girls and boys.  相似文献   
2.
In an early study in the Journal of Applied Behavior Analysis, Rekers and Lovaas (1974) evaluated the Behavioral Treatment of Deviant Sex-role Behaviors in a Male Child. They investigated the use of reinforcement and punishment to target non-gender-conforming behaviors of a 5-year-old male child. This study was considered by some to be controversial and concerning, even near the time of publication (Nordyke et al. 1977; Winkler, 1977). The concerns focused on the ethicality of selecting non-gender-conforming behavior as a target response and the use of punishment for this type of response, particularly at the behest of parents when the young child was not seemingly distressed. The study has subsequently been used as empirical support for conversion therapy creating concerns about misinterpretation of the original article and harm to the LGBTQ+ community. This editorial reviews the concerns originally presented by Nordyke et al. (1977) and Winkler (1977) and issues an official Expression of Concern about the various harms that have been associated with this paper.  相似文献   
3.
郭彧 《周易研究》2003,(2):49-55
自南宋时起,《易数钩隐图》一书的作者就有二字与二籍贯的争议。本文就有关问题进行了考辨。得出北宋有二刘牧、前刘牧著《易数钩隐图》、黄黎献为之续补等结论。最后指出,彭城刘牧的道学思想应当在宋明理学中占有一席之地。  相似文献   
4.
Racism en Route     
This article argues that in Africa, the nature and advent of racism has to be traced back to the earliest encounters between Africans and Europeans, including the first seven centuries but especially during the slavery and colonial eras. Religion (notably Islam and Christianity), trade, education, culture, and “science” were important incubators and justifiers of racism, in earlier as well as recent times. The paper concludes by proposing some ways in which African theology can stay agile and keep pace with the resilient and adaptive forms of racism in contemporary Africa.  相似文献   
5.
ABSTRACT

This work examines differences in the work-related values, expectations, and behaviors between millennials who are significant users of technology and social media, and those who are not. We delineate the development of millennial behavior using a unique group of millennials, those in the Ultra-Orthodox Jewish (known as “Haredi”) community in Israel. Due to religious and community norms, many Haredi millennials were shielded from digital technology, and particularly the Internet and the various technologies associated with it, such as text messaging and social media. Those who were raised and remained in Haredi communities did not encounter the Internet with any regularity as children. Many as adults are still unfamiliar with social media. Thus, this community presents a unique natural experiment, comparing Haredi millennials who are immersed in social media with those who are not.  相似文献   
6.
By roughly 6 years of age, children acquire the stereotype that men are more competent than women in science, technology, engineering, and mathematics (STEM), potentially leading to greater trust in scientific information provided by men. This study tested whether 3- to 8-year-old children differentially endorsed conflicting information about science and toys presented by male and female informants depicted as a ‘man’ and ‘woman’ (Exp1) or ‘scientists’ (Exp2). Children were expected to endorse toy testimony from gender-matched informants; thus, the key question concerned endorsement of science testimony. In Exp1 (N = 149), boys and girls showed a same-gender informant preference for toy testimony; however, girls endorsed the male informant's testimony more for science than for toys – but only when tested by a male experimenter. In Exp2 (N = 264), boys and girls showed a same-gender preference, irrespective of content. Findings suggest that STEM-related gender stereotypes might lead girls to trust scientific information presented by men over women in certain contexts.  相似文献   
7.
Antepartum Foetal surveillance is the most vital epoch of investigation during the pregnancy period. This surveillance would provide an opening to plan and manage the Foetus during Intrapartum and Antepartum stages of pregnancy. Moreover, it will help to identify high risk Foetuses during pregnancies which are complicated by maternal health conditions like diabetes mellitus, intrauterine growth restriction, etc. The foetal electrocardiogram (fECG) signal can be detected in the course of pregnancy from the Antepartum stage. Generally, fECG signal analysis is not carried out for Foetal surveillance. Rather, the traditional methodologies like phonocardiogram, etc. are being utilized. The reason is the unavailability of an effective methodology for providing good quality fECG signal. The proposal of a hybrid tactic called Bayesian Deep Belief Network (BDBN) for fECG signal enhancement is presented in this article. The proposed BDBN technique involves Baye’s filtering methodology in amalgamation with Deep Belief Network. The Baye’s filtering was employed to eliminate undesired signal components. Deep learning (DL) technique was utilized with Deep belief network (DBN) to extract high quality fECG signal. The methodology resulted with good quality fECG signal which is indeed valuable for timely Physician analysis.  相似文献   
8.
This paper uses an extension of the network algorithm originally introduced by Mehta and Patel to construct exact tail probabilities for testing the general hypothesis that item responses are distributed according to the Rasch model. By assuming that item difficulties are known, the algorithm is applicable to the statistical tests either given the maximum likelihood ability estimate or conditioned on the total score. A simulation study indicates that the network algorithm is an efficient tool for computing the significance level of a person fit statistic based on test lengths of 30 items or less.  相似文献   
9.
Eugene Ryan 《Argumentation》1992,6(3):291-296
The first part of this paper contends that argumentation is central and essential to Aristotle's Rhetoric, and recounts a number of arguments in support of that view, particularly the recognition that deliberative rhetoric or the rhetoric of counsel is the primary concern of Aristotle's work. The second part of the paper reviews the work that follows in this present volume to show that the other writers' views fit in perfectly with this thesis.  相似文献   
10.
We propose a method for detecting influential observations in iterative principal factor analysis. For this purpose we derive the influence functionsI(x; LL T ) andI(x; ) for the common variance matrixT =LL T and the unique variance matrix , respectively, in the common factor decomposition =LL T + . A numerical example is given for illustration.The authors are grateful to Tomoyuki Tarumi and Atsuhiro Hayashi for their kind permission to use their software Seto/B for drawing Figures 1 and 2 and to anonymous reviewers for comments on the paper.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号