首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This paper seeks to meet the need for a general treatment of the problem of error in classification. Within an m-attribute classificatory system, an object's typical subclass is that subclass to which it is most often allocated under repeated experimentally independent applications of the classificatory criteria. In these terms, an error of classification is an atypical subclass allocation. This leads to definition of probabilitiesO of occasional subclass membership, probabilitiesT of typical subclass membership, and probabilitiesE of error or, more generally, occasional subclass membership conditional upon typical subclass membership. In the relationshipf: (O, T, E) the relative incidence of independentO, T, andE values is such that generally one can specifyO values givenT andE, but one cannot generally specifyT andE values givenO. Under the restrictions of homogeneity ofE values for all members of a given typical subclass, mutual stochastic independence of errors of classification, and suitable conditions of replication, one can find particular systemsO =f(T, E) which are solvable forT andE givenO. A minimum of three replications of occasional classification is necessary for a solution of systems for marginal attributes, and a minimum of two replications is needed with any cross-classification. Although for such systems one can always specifyT andE values givenO values, the solution is unique for dichotomous systems only.With grateful acknowledgement to the Rockefeller Foundation; and to the United States Department of Health, Education, and Welfare, Public Health Service, for N. I. M. H. Grant M-3950.  相似文献   

2.
In this research, we examined children's awareness of inconsistencies in messages that are meaningful for children, instructions for games. In the first experiment, kindergarten (n = 25) and second- (n = 25) and fourth-grade (n = 26) children were individually read the instructions for two games, each of which included two inconsistent statements. Chi-square analyses yielded a significant effect for grade for one game (p < .05) and a marginally significant effect for a second game (p < .10). In a second experiment, second- (n = 40), fourth- (n = 40), and sixth-grade (n = 40) children were read the instructions for two games, each of which included two statements that were inconsistent. An analysis of variance demonstrated that with an increase in grade, there was a significant increase (p < .001) in awareness that a message contained an inconsistency. The analysis also indicated that the subjects were more willing (p < .08) to question an adult than they were to question a child about an inconsistency. Moreover, a regression analysis indicated that awareness of inconsistencies in the rules for games was significantly related to memory (p < .001) and to one's ability to note inconsistencies in shorter, simpler messages (p < .001).  相似文献   

3.
A method for externally constraining certain distances in multidimensional scaling configurations is introduced and illustrated. The approach defines an objective function which is a linear composite of the loss function of the point configurationX relative to the proximity dataP and the loss ofX relative to a pseudo-data matrixR. The matrixR is set up such that the side constraints to be imposed onX's distances are expressed by the relations amongR's numerical elements. One then uses a double-phase procedure with relative penalties on the loss components to generate a constrained solutionX. Various possibilities for constructing actual MDS algorithms are conceivable: the major classes are defined by the specification of metric or nonmetric loss for data and/or constraints, and by the various possibilities for partitioning the matricesP andR. Further generalizations are introduced by substitutingR by a set ofR matrices,R i ,i=1, ...r, which opens the way for formulating overlapping constraints as, e.g., in patterns that are both row- and column-conditional at the same time.  相似文献   

4.
Eighty-one female students at a German university were asked to indicate in writing (a) how they would come to like, love, and be in love with someone, and (b) how in their case liking, loving, and being in love with someone would come to an end. The responses were analyzed using a comprehensive list of 117 determinants developed for this study, which were grouped into four causal categories–P (person), O (other), P×O (relational), and E (environmental) conditions. Regarding the rise of attraction, the most frequent determinant for liking and for being in love was the existence of positive attributes of O (69% and 63%); for love, it was the existence of positive feelings from O (29%). Regarding the decline of attraction, the most frequent determinant for liking was negative behavior on O's part (42%); for love, abuse of one's trust by O (25%); and for being in love, disillusionment with regard to O (44%). Further analyses (including ANOVAs) involved the mean frequencies for the four causal categories. Concerning the rise of attraction sentiments, P causes were predominant for love and O causes were predominant for liking and for being in love; P×O causes were particularly infrequent for being in love. Concerning the decline of attraction sentiments, only for liking was one causal category predominant (O causes). E causes were hardly mentioned for both the rise and the decline focus. The findings are discussed in the context of both the more traditional research on “objective” determinants of attraction and, in particular, of recent research on the subjective (common-sense or implicit) understanding of liking, love, and being in love.  相似文献   

5.
The aim of this paper is to offer a rigorous explication of statements ascribing ability to agents and to develop the logic of such statements. A world is said to be feasible iff it is compatible with the actual past-and-present. W is a P-world iff W is feasible and P is true in W (where P is a proposition). P is a sufficient condition for Q iff every P world is a Q world. P is a necessary condition for Q iff Q is a sufficient condition forP. Each individual property S is shown to generate a rule for an agent X. X heeds S iff X makes all his future choices in accordance with S. (Note that X may heed S and yet fail to have it). S is a P-strategy for X iff X's heeding S together with P is a necessary and sufficient condition for X to have S. (P-strategies are thus rules which X is able to implement on the proviso P).Provisional opportunity: X has the opportunity to A provided P iff there is an S such that S is a P-strategy for X and X's implementing S is a sufficient condition for X's doing A. P is etiologically complete iff for every event E which P reports P also reports an etiological ancestry of E, and P is true. Categorical opportunity: X has the opportunity to A iff there is a P such that P is etiologically complete and X has the opportunity to A provided P. For X to have the ability to A there must not only be an appropriate strategy, but X must have a command of that strategy. X steadfastly intends A iff X intends A at every future moment at which his doing A is not yet inevitable. X has a command of S w.r.t. A and P iff X's steadfastly intending A together with P is a sufficient condition for X to implement S. Provisional ability: X can A provided P iff there is an S such that S is a P-strategy for X, X's implementing S is a sufficient condition for X's doing A, and X has a command of S w.r.t. A and P. Categorical ability: X can A iff there is a P such that P is etiologically complete and X can A provided P. X is free w.r.t. to A iff X can A and X can non- A. X is free iff there is an A such that X is free w.r.t. A.  相似文献   

6.
Bailey and Gower examined the least squares approximationC to a symmetric matrixB, when the squared discrepancies for diagonal elements receive specific nonunit weights. They focussed on mathematical properties of the optimalC, in constrained and unconstrained cases, rather than on how to obtainC for any givenB. In the present paper a computational solution is given for the case whereC is constrained to be positive semidefinite and of a fixed rankr or less. The solution is based on weakly constrained linear regression analysis.The authors are obliged to John C. Gower for stimulating this research.  相似文献   

7.
We introduce a novel procedure for investigating factors that determine selective attention to letters in words. Participants were presented with words (in Experiments 1 and 3) and nonwords (in Experiment 2) that contained a buried word whose letters differed in color relative to the other letters present (e.g.,pig, in spring). The strings were presented in single case or mixed case, keeping the letters of the buried words in one case (SpRiNg). The time in which the whole stimulus was named was shorter for same-case than for mixed-case strings (forspring: spring < SpRiNg). In contrast, the time in which buried words were named was shorter in mixed- than in same-case strings (forpig: spring > SpRiNg). Across items, the effects of case mixing were negatively correlated across the two tasks. The positive effect of case mixing for buried words also occurred irrespective of whether the whole string was a word or a nonword, and there were contributions from similarity of both letter size and case. The results suggest that case mixing can facilitate selective attention to letters, which is otherwise disrupted by size- and case-based grouping across letter strings. The study provides evidence for letter grouping using size and case information.  相似文献   

8.
The magnetic properties of a Mn-doped armchair ZnO nanotube have been studied using Monte Carlo simulation. The variation of zero-field-cooled and field-cooled magnetisation with reduced temperatures for different values of the dilution x (where x is the Mn concentration: Zn1?xMnxO) are given. The freezing temperatures and magnetisation vs. crystal field are calculated for different dilutions x. Finally, the hysteresis loops for different dilutions and temperatures are given for a fixed reduced temperature and crystal field. Superparamagnetic behaviour is observed for small values of x and low temperatures.  相似文献   

9.
The main result of this paper is the following theorem: each modal logic extendingK4 having the branching property belowm and the effective m-drop point property is decidable with respect to admissibility. A similar result is obtained for intermediate intuitionistic logics with the branching property belowm and the strong effective m-drop point property. Thus, general algorithmic criteria which allow to recognize the admissibility of inference rules for modal and intermediate logics of the above kind are found. These criteria are applicable to most modal logics for which decidability with respect to admissibility is known and to many others, for instance, to the modal logicsK4,K4.1,K4.2,K4.3,S4.1,S4.2,GL.2; to all smallest and greatest counterparts of intermediate Gabbay-De-Jong logicsD n; to all intermediate Gabbay-De-Jong logicsD n; to all finitely axiomatizable modal and intermediate logics of finite depth etc. Semantic criteria for recognizing admissibility for these logics are offered as well.The results of this paper were obtained by the author during a stay at the Free University of Berlin with support of the Alexander von Humboldt Foundation in 1992 – 1993.Presented byWolfgang Rauntenberg  相似文献   

10.
Summary This paper studies some classic cases of the fallacy of begging the question based on appeals to testimony containing circular reasoning. For example, suppose agents a, b and c vouch for d’s credentials, and agents b, d, and e vouch for a’s credentials. Such a sequence of reasoning is circular because a is offering testimony for d but d is offering testimony for a. The paper formulates and evaluates restrictions on the use of testimonial evidence that might be used to deal with such problematic arguments. One is called the Non-repeater Rule: in an extended sequence of argumentation based on testimony, once a source x has been appealed to at any given point in the sequence, that same source x must never be appealed to again at any next point in the same sequence.  相似文献   

11.
Several authors have studied or used the following estimation strategy for meta‐analysing correlations: obtain a point estimate or confidence interval for the mean Fisher z correlation, and transform this estimate to the Pearson r metric. Using the relationship between Fisher z and Pearson r random variables, I demonstrate the potential discrepancy induced by directly z‐to‐r transforming a mean correlation parameter. Point and interval estimators based on an alternative integral z‐to‐r transformation are proposed. Analytic expressions for the expectation and variance of certain meta‐analytic point estimators are also provided, as are selected moments of correlation parameters; numerical examples are included. In an application of these analytic results, the proposed point estimator outperformed its usual direct z‐to‐r counterpart and compared favourably with an estimator based on Pearson r correlations. Practical implications, extensions of the proposed estimators, and uses for the analytic results are discussed.  相似文献   

12.
To what extent can we rely on others for information without such reliance becoming epistemically problematic? In this paper, this question is addressed in terms of a specific form of reliance: cognitive outsourcing. Cognitive outsourcing involves handing over (outsourcing) one's information collection and processing (the cognitive) to others. The specific question that will be asked about such outsourcing is if there is an epistemic problem about cognitive outsourcing as such. To ask if there is an epistemic problem with x for S is to ask if x is a problem for S’s ability to acquire true belief and avoid false belief. To ask if there is a problem for S with x as such is to ask if it is impossible to solve the problem for S while leaving x as is. I argue that, if we consider the five most plausible candidate epistemic problems raised by cognitive outsourcing—i.e., unreliability, gullibility, irrationality, dependency, and lack of epistemic autonomy—we see for each candidate that it is either not an epistemic problem, or not a problem about cognitive outsourcing as such.  相似文献   

13.
Spoken-word recognition in a nonnative language is particularly difficult where it depends on discrimination between confusable phonemes. Four experiments here examine whether this difficulty is in part due to phantom competition from “near-words” in speech. Dutch listeners confuse English /æ/ and /?/, which could lead to the sequence daf being interpreted as deaf, or lemp being interpreted as lamp. In auditory lexical decision, Dutch listeners indeed accepted such near-words as real English words more often than English listeners did. In cross-modal priming, near-words extracted from word or phrase contexts (daf from DAFfodil, lemp from eviL EMPire) induced activation of corresponding real words (deaf; lamp) for Dutch, but again not for English, listeners. Finally, by the end of untruncated carrier words containing embedded words or near-words (definite; daffodil) no activation of the real embedded forms (deaf in definite) remained for English or Dutch listeners, but activation of embedded near-words (deaf in daffodil) did still remain, for Dutch listeners only. Misinterpretation of the initial vowel here favoured the phantom competitor and disfavoured the carrier (lexically represented as containing a different vowel). Thus, near-words compete for recognition and continue competing for longer than actually embedded words; nonnative listening indeed involves phantom competition.  相似文献   

14.
In this paper, I consider whether a reading of Kant's solution to the Third Antinomy can offer material for devising a new model of transcendental argument. The problem that this form of argument is meant to address is an antinomy between two apparently contradictory claims, q and ¬q, where we seem equally justified in holding both. The model has the following form: p; q is a necessary condition of p; the only justification we have for q is that it is a necessary condition of p; p is justified only in domain X (where X is a domain of objects of cognition); therefore, q is justified only in domain X. Because the argument shows that our justification for q is valid only in X, it also establishes that there is conceptual space to hold ¬q outside of X.  相似文献   

15.
There exists a terminological problem in applied behavior analysis: the term frequency has been used as a synonym for both rate (the number of responses per time) and count (the number of responses). To guide decisions about the use and meaning of frequency, we surveyed the usage of frequency in contemporary behavior‐analytic journals and textbooks and found that the predominant usage of frequency was as count, not rate. Thus, we encourage behavior analysts to use frequency as a synonym for count.  相似文献   

16.
This study investigated how Japanese-speaking learners of English pronounce the three point vowels /i/, /u/, and /a/ appearing in the first and second monosyllabic words of English noun phrases, and the schwa /ə/ appearing in English disyllabic words. First and second formant (F1 and F2) values were measured for four Japanese speakers and two American English speakers. The hypothesis that the area encompassed by the point vowels in the F1-F2 vowel space tends to be smaller for the Japanese speakers than for the English speakers was verified. The hypothesis that the area formed by the three schwas in chicken{{chick\underline{e}n}}, spoonful{{spoonf{\underline{u}}l}}, and Tarzan{{Tarz\underline{a}n}} is greater for the Japanese speakers than for the English speakers and its related hypothesis were largely upheld. Implications for further research are briefly discussed.  相似文献   

17.
Using a variation of the Deese/Roediger–McDermott paradigm in four experiments, we examined hit rate, false alarm rate, and memory discriminability (d′) for critical items (e.g., sleep) after their semantic associates (e.g., dream, rest, and awake), phonological associates (e.g., bleep, sheep, and cheap) or unrelated items were studied. Replicating previous research (e.g., Neely & Tse, 2007), d′ was lower for critical items than for yoked associates in semantic lists. However, d′ was higher for critical items than for yoked associates in phonological lists, even when the same critical items were used for these two list types. The memory discriminability of critical items was enhanced by phonological lists via a larger increase in their hit rates than in their false alarm rates, relative to the same critical items in lists of unrelated words. These findings (a) could not be fully accounted for by the activation-based theories proposed in the false memory literature, and (b) may suggest that the memory discriminabilities of semantic and phonological lists are modulated by two distinct activation mechanisms.  相似文献   

18.
This paper presents a test for determining significance of differences between means of samples which are drawn from positively skewed populations, more specifically, those having a Pearson Type III distribution function. The quantity 2npx g /x p (wherep equals the mean squared divided by the variance andn is the number of cases in the sample), which distributes itself as Chi Square for 2np degrees of freedom, may be referred to the tables of Chi Square for testing hypotheses about the value of the true mean. For two independent samples, the larger mean divided by the smaller mean, which distributes itself asF for 2n 1 p 1 and 2n 2 p 2 degrees of freedom, may be referred to theF distribution tables for testing significance of difference between means. The test assumes that the range of possible scores is from zero to infinity. When a lower theoretical score limit (c) exists which is not zero, the quantity (Mean —c) should be used instead of the mean in all calculations.  相似文献   

19.
This study replicated and extended Kranzler and Jensen's [Intelligence 13 (1989) 329] meta-analysis of the relationship between inspection time (IT) and intelligence (IQ). Separate meta-analyses were conducted on obtained correlations (r's) between IT and general IQ for the total sample and for studies using samples of adults and children. Two new meta-analyses were also conducted. The first compared the IT–IQ r between visual and auditory IT; the second compared the r between strategy users and nonusers. For the total sample (N>4100), the r was −.51 after correction for artifactual effects (−.30 prior to correction). No statistically significant difference was observed between the mean corrected r of −.51 for adults and −.44 for children. The mean corrected r for visual and auditory IT measures were −.49 and −.58, respectively, suggesting that the relationship between IT and IQ is comparable across type of IT task. The mean corrected r of −.77 for strategy nonusers was statistically significantly higher than the r of −.60 for strategy users. Implications of these findings for future research are discussed.  相似文献   

20.
A summary of research findings showed that men who choose female-dominated occupations likely possess many of the same traits and characteristics often attributed to women in the same jobs. Contrary to stereotypes, men generally are comfortable with themselves and their masculine sexuality, although they score lower in Bem's masculine identity than traditional men. A framework for the process of men's nontraditional career choice is presented based on previous career development models for traditional careers plus a review of the empirical research literature. Implications for professional counselors and organizations are discussed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号