首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   51篇
  免费   0篇
  51篇
  2024年   2篇
  2023年   1篇
  2022年   3篇
  2021年   2篇
  2020年   1篇
  2019年   3篇
  2018年   8篇
  2017年   6篇
  2016年   1篇
  2015年   3篇
  2014年   3篇
  2013年   2篇
  2012年   4篇
  2011年   2篇
  2009年   3篇
  2007年   1篇
  2005年   4篇
  2004年   1篇
  2003年   1篇
排序方式: 共有51条查询结果,搜索用时 0 毫秒
31.
Mehdi Nasrin 《Erkenntnis》2004,60(3):283-293
The Logical Reconstruction of the World (Aufbau) is oneof the major works of Rudolf Carnap in which he attempts to putan end to some of the traditional disputes in epistemologyby using what he calls `construction theory'. According tothis theory, one or more constructional systems can be designedin which all the scientific and pre-scientific objects are logicallymade out of a limited number of basic elements. Carnap introducessome options for the basis of this system and chooses thedomain of the autopsychological, i.e., the domain of privateelementary experiences, among them and tries to construct all theconcepts out of them. This phenomenalistic reduction sometimes isseen as embracing a Cartesian dualism of mind and body or even amentalistic monism. However, in this paper, I shall try to showthat the traditional dualist-monist debates are among those disputesthat the construction theory aims to get rid of. I will show thatCarnap's position on the mind-body problem is really close towhat Davidson later termed as `Anomalous Monism' and that thisis why Carnap fails to complete his logical construction at a crucial step. Whenever possible, logicalconstructions are to be substituted forinferred entities. Bertrand Russell  相似文献   
32.
Peer review is the most important aspect of reputable journals. Without it, we would be unsure about whether the material published was as valid and reliable as is possible. However, with the advent of the Internet, scientific literature has now become subject to a relatively new phenomenon: fake peer reviews. Some dishonest researchers have been manipulating the peer review process to publish what are often inferior papers. There are even papers that explain how to do it. This paper discusses one of those methods and how editors can defeat it by using a special review ID. This method is easy to understand and can be added to current peer review systems easily.  相似文献   
33.
    
Different methods of poisoning used by individuals with the diagnosis of parasuicide admitted to the Loghman Hospital, Tehran, from 2000 to 2004 were investigated, with particular focus on gender and age differences. Drugs, pesticides, and other agricultural chemicals (women: 12.7%, men: 9%) were the most commonly used methods. In males, the percentage of use of drugs increased with age, but the frequency of pesticides use decreased with age. In females, drugs were most often used in the youngest age group, whereas the use of pesticides was lowest in the youngest age category. Females outnumbered males, especially in the youngest age group of 10 to 19 years olds. Drugs and pesticides were the substances used most often for parasuicide in each age group regardless of gender.  相似文献   
34.
    
This paper discusses the fit between attribute-based versus alternative-based processing and regulatory focus, and its impact on decision outcome valuation. Attribute-based processing was found to occur more frequently under prevention focus, whereas alternative-based processing occurred more frequently under promotion focus. The fit between prevention/promotion focus and attribute-based/alternative-based processing was found to enhance satisfaction with choices and the perceived monetary value of chosen options. Moreover, the effect of fit on outcome valuation was found to be mediated by ease of processing. Finally, the effects of fit on ease of processing and outcome valuation disappeared when consumers first practiced to process information based on either attributes or alternatives.  相似文献   
35.
In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are presented.  相似文献   
36.
    
This study investigated the novel associations between intrinsic and extrinsic aspirations and internal and external domains of contingent self-worth among a sample of 502 Iranian university students. We found a meaningful pattern showing that intrinsic aspirations were positively associated with internal domains, whereas extrinsic aspirations were positively associated with external domains. Our survey data also suggested that the factor structure of the Aspiration Index, as well as the factor structure of the Contingencies of Self-Worth Scale in our Iranian sample were consistent with factor structures of foreign samples. Finally, the types of aspirations and domains of contingencies of self-worth meaningfully predicted variables related to well-being, confirming previous research. We discuss the nature of the associations between the aspirations and the domains of contingent self-worth.  相似文献   
37.
38.
    
Shared awareness was studied in one novice and one expert basketball team during real games. Teams were considered dynamic social networks with team members as nodes and members’ awareness of other members during ongoing performance as relations. Networks, and changes to them across games, were analysed at different levels of organization using social network analysis to identify patterns of awareness within the teams. The results showed that one team member in each team often heeded, or was heeded by, his teammates, indicating his leadership role in coordinating the team. Also, expert team members had a low level of awareness of their teammates, which may be explained by implicit coordination processes. Finally, there was less variability in intra-team relations in the expert (vs. novice) team, which may be explained by the enhanced ability of the expert team to achieve and maintain an optimal level of awareness during the game. At a practical level, teams might be alerted during performance when their network of connections approaches connectedness thresholds that predict coordination breakdowns, affording online regulation of team processes. Future studies should explore the generalizability of these early findings using larger samples.  相似文献   
39.
    
To test whether mental activities collected from non-REM sleep are influenced by REM sleep, we suppressed REM sleep using clomipramine 50mg (an antidepressant) or placebo in the evening, in a double blind cross-over design, in 11 healthy young men. Subjects were awakened every hour and asked about their mental activity. The marked (81%, range 39-98%) REM-sleep suppression induced by clomipramine did not substantially affect any aspects of dream recall (report length, complexity, bizarreness, pleasantness and self-perception of dream or thought-like mentation). Since long, complex and bizarre dreams persist even after suppressing REM sleep either partially or totally, it suggests that the generation of mental activity during sleep is independent of sleep stage.  相似文献   
40.
    
In this article, we used a social injunctive norm to incentivize the elaboration of energy-efficient projects within a building renovation simulation application. We manipulated the norm saliency (presence on the interface) and compared its effect to that of an arbitrary set goal and a no-goal condition (control). Results show that both an injunctive norm and an explicit goal, when salient, led to more energy-efficient designs. Furthermore, participants exposed to the salient injunctive norm identified important parameters more quickly, were more efficient, and were more consistently focused on energy (vs. furnishing). Implications for theory and methodology for further experiments are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号