首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1163篇
  免费   14篇
  国内免费   1篇
  1178篇
  2023年   9篇
  2021年   9篇
  2020年   13篇
  2018年   22篇
  2017年   25篇
  2016年   38篇
  2015年   20篇
  2014年   19篇
  2013年   108篇
  2012年   43篇
  2011年   42篇
  2010年   21篇
  2009年   15篇
  2008年   28篇
  2007年   36篇
  2006年   42篇
  2005年   31篇
  2004年   34篇
  2003年   25篇
  2002年   40篇
  2001年   17篇
  2000年   25篇
  1999年   23篇
  1998年   22篇
  1997年   10篇
  1996年   20篇
  1995年   13篇
  1994年   10篇
  1993年   14篇
  1992年   19篇
  1991年   16篇
  1990年   17篇
  1989年   20篇
  1988年   12篇
  1987年   19篇
  1986年   19篇
  1985年   21篇
  1984年   17篇
  1983年   14篇
  1982年   12篇
  1981年   18篇
  1980年   9篇
  1979年   15篇
  1978年   18篇
  1977年   14篇
  1976年   18篇
  1974年   11篇
  1973年   12篇
  1972年   12篇
  1966年   18篇
排序方式: 共有1178条查询结果,搜索用时 0 毫秒
61.
In recent decades, it has become more common for speed limits to be set for political reasons rather than for safety reasons. As a consequence, the motoring public seems to have increasingly begun questioning the rationality of speed limits. This is evident in observed speed data that show that the majority of drivers routinely exceed posted speed limits. A key motivating factor in drivers’ tendency to exceed the speed limit is that they believe that the excess speed does not threaten safety. This paper, specifically studies this matter by using a survey that asked drivers how fast above the speed limit they feel they can drive before safety is threatened. A probabilistic model is estimated using data gathered from 988 drivers in Indiana. Estimation findings show that drivers’ perception of the speed above the speed limit at which they will receive a speeding ticket is a critical determinant of what they believe is a safe speed – suggesting that enforcement plays an important role in safety perceptions. Other variables found to be significant factors in determining the speed above the speed limit at which safety is first threatened include age, gender, being previously stopped for speeding, and drivers’ ethnicity.  相似文献   
62.
Reinforcement sensitivity theory (RST; Gray, 1987; Gray & McNaughton, 2000) has proven to be a valuable tool for understanding psychopathy (e.g., Fowles, 1980, 1988; Newman & Malterer, 2009; Poythress et al., 2008). Recent research has linked two RST constructs, the Behavioral Inhibition System (BIS) and the Behavioral Activation System (BAS), to individuals with primary psychopathy and secondary psychopathy (Lykken, 1995; Newman, MacCoon, Vaughn, & Sadeh, 2005): Primary psychopaths manifest low BIS reactivity and secondary psychopaths manifest high BAS reactivity. In the present study, we examine the relationships between the BIS/BAS constructs and Factors 1 and 2 of the Psychopathy Checklist – Revised (PCL-R) in a sample of 472 incarcerated male offenders. Paralleling their relationships with primary and secondary psychopathy, the BIS/BAS constructs were differentially related to the two PCL-R factors. Specifically, the influence of the BIS was found to be more prominent than the influence of the BAS for Factor 1, and the influence of the BAS was more prominent than that of the BIS for Factor 2.  相似文献   
63.
The present study evaluated the effectiveness of school-based prevention and intervention programs for children and adolescents at-risk for and with emotional disturbance. Published outcome studies (k = 29) from December, 1988, to March, 2006, including 1405 children and adolescents were reviewed. Each investigation was coded on several variables describing the child, parent, and teacher samples, as well as reported outcome results. The overall mean weighted effect size was 1.00 at post-test and 1.35 at follow-up. Mean weighted ESs were 0.42 for between-subjects design studies, 0.87 for within-subjects design studies, and 1.87 for single-subject design studies. Prevention programs yielded a mean weighted ES of 0.54 and intervention programs produced a mean weighted ES of 1.35. Findings for specific outcome foci are presented and implications are discussed.  相似文献   
64.
65.
In our research, the data are gathered in the laboratory on a DEC PDP-11/24 minicomputer. Once the data are gathered, they are analog-to-digital (A/D) converted and sent by the PDP to an IBM 370-3031. The data are submitted to a Fast Fourier Transform (FFT) on the IBM computer. Once the FFT is completed, the data are accessed by an IBM PC-XT that is equipped with an IRMA system. The PC is used in its emulation mode to access the data in the mainframe. In the mainframe, SPSS or SAS is used to do the initial statistical analyses. When necessary, subsets of the data are transferred to the PC, where other computer programs are used to analyze the data. In many instances, they are returned to the mainframe from the PC, where they are submitted to multivariate statistical analysis. Finally, all of the data are stored on floppy disks, which are prepared on the PC.  相似文献   
66.
67.
KILMARTIN (1994) suggested that masculine traits may result from externalizing defense style and that when unconscious and unwanted feminine traits about the self occur, they are dealt with in an external way, radier man being directiy resolved by the individual. However, this dieory has received little empirical support. Lobel and Winch (1986) measured defense style among male college students; they found mat men who scored higher in masculinity tended to score higher on acting out (finding an object to attack) and splitting (separating affect from content). Lobel and Winch concluded mat use of diese defense styles reflects avoidance of emotional expression. In turn, diese findings have been supported by research that has suggested mat men use avoidance coping strategies more man women do (McCall &; Struthers, 1994).  相似文献   
68.
69.
The Five-Factor Model was used to examine personality organization in 211 six-year-old children (135 maltreated and 76 nonmaltreated). Longitudinal assessments were conducted at ages 7, 8, and 9. Six-year-old maltreated children exhibited lower agreeableness, conscientiousness, and openness to experience and higher neuroticism than did nonmaltreated children. Maltreated children also were more frequently represented in less adaptive personality clusters than were their nonmaltreated counterparts. A particularly vulnerable profile occurred predominantly among maltreated children and was related to experiencing both abuse and neglect. Child maltreatment and personality clusters were related to individual differences perceived by peers. Longitudinal stability of the personality dimensions also was assessed. At age nine, evidence was found for maintenance of the organization of the personality clusters obtained at age six and for continuity of maltreated children's personality liabilities.  相似文献   
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号