全文获取类型
收费全文 | 1973篇 |
免费 | 175篇 |
国内免费 | 341篇 |
专业分类
2489篇 |
出版年
2024年 | 3篇 |
2023年 | 39篇 |
2022年 | 47篇 |
2021年 | 77篇 |
2020年 | 82篇 |
2019年 | 143篇 |
2018年 | 97篇 |
2017年 | 130篇 |
2016年 | 110篇 |
2015年 | 76篇 |
2014年 | 111篇 |
2013年 | 409篇 |
2012年 | 91篇 |
2011年 | 140篇 |
2010年 | 69篇 |
2009年 | 125篇 |
2008年 | 125篇 |
2007年 | 92篇 |
2006年 | 74篇 |
2005年 | 75篇 |
2004年 | 82篇 |
2003年 | 72篇 |
2002年 | 60篇 |
2001年 | 34篇 |
2000年 | 29篇 |
1999年 | 16篇 |
1998年 | 10篇 |
1997年 | 18篇 |
1996年 | 11篇 |
1995年 | 10篇 |
1994年 | 5篇 |
1993年 | 6篇 |
1992年 | 7篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1980年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有2489条查询结果,搜索用时 15 毫秒
111.
GoalTo apply signal processing and machine learning skills and knowledge in processing the EEG and MEG signal and further localize and evaluate the source of the finger stimulation.MethodsCognitive control is usually applied in information processing and behavioral response. In the preprocessing, baseline correction is implemented to analyze the pre-stimuli, combining ERP to mark the event related potential, studying the time-locked only behavior. Z-score transform, coherence and spec trum are calculated and analyzed in the functional connectivity analysis.In addition to the functional analysis, Bayes Optimizer evaluates the neuro imaging according to the hierarchical Bayes. The introduction of the application is described from both user and developer’s prospects. Results: Introduction of both user and developers aspects, on its modules from pre-processing, functional analysis and results visualization and evaluation is conducted with one specific clinical data case, including the correlation is higher especially on gamma band and the MVAR coherence on the whole source space depicting the relation between different regions, especially on somatosensory (compared by thalamus) when stimulated by finger activity, phase-lock property of the E/MEG signal and etc. Compared to a manual selection, the scaling parameter prediction can be improved with support vector machine (SVM). The evaluation results with Bayes Optimization, location prediction is superior in the somatosensory area and in the thalamus, the total reconstructed source space is larger, one of the realization of cognitive system comparing different kernels and classifiers. The SVM and discriminant classifier gives similar results evaluating the dipole localization and the parameter choice related as well to the shape parameter, noise level, hyperprior and etc.ConclusionApproaches of Brain Q are found to be suitable for pre-processing for the EEG and MEG data. The system is capable of functional analysis including coherence and spectral related computation. Machine learning techniques are conducted as well to analyze and evaluate the result of the dipole reconstruction and help to predict the better model parameters and the localization of the origin dipoles. A case on finger stimulation clinical data is conducted and the results of the analysis temporarily and spatially manifests its functionality for users and potential extensions for developers. 相似文献
112.
发展性阅读障碍者的快速命名缺陷 总被引:1,自引:0,他引:1
快速命名任务是一种需要命名多个高熟悉项目的认知任务,尤其适合用来对成因复杂的发展性阅读障碍进行研究。许多研究者使用不同类型的快速命名任务发现,发展性阅读障碍者的快速命名缺陷在眼动过程表现为中央凹和副中央凹的加工困难,在认知过程中表现为抑制能力较差等。未来的研究中应该注意到快速命名缺陷的复杂性,采用多种方法相结合的方式来探究快速命名缺陷的本质,从而建立系统性的假说。 相似文献
113.
114.
在视觉搜索过程中,老年人是否可以在不同情境下调节自上而下和自下而上的加工水平尚不明确。为了探讨老化对认知灵活性的影响,研究采用空间线索范式,通过比较有效线索和无效线索来考察对线索的注意加工水平(注意捕获、注意抑制),通过比较目标相关和目标无关线索的注意加工水平来考察自上而下和自下而上的作用,通过改变分心物一致性来调控不同的目标凸显情境。结果发现,年轻组在目标非凸显时的空间线索效应高于目标凸显时,表明年轻人会依据目标凸显性调整自上而下的加工水平;但老年组却没有产生这种差异,其更依赖自上而下的加工,注意系统会对目标相关的线索进行注意捕获,对目标无关的线索进行注意抑制。结果表明,随着年龄的增长,认知控制的灵活性下降,表现出对自上而下加工较多的依赖;此外,老年人依然保留着注意捕获和注意抑制的能力,这对认知老化中抑制能力受损的观点提出了挑战。 相似文献
115.
116.
Paulo Ventura Joana C. Carmo Cristiane Souza Fábio Martins Isabel Leite Sandra Pinho 《Visual cognition》2018,26(1):13-24
Are face recognition difficulties in Autism Spectrum Disorders (ASD) related to impaired holistic processing? Gauthier et al. [Gauthier, I., Klaiman, C., &; Schultz, R. T. (2009). Face composite effects reveal abnormal face processing in Autism spectrum disorders. Vision Research, 49, 470–478. doi:10.1016/j.visres.2008.12.007] used the face composite task in adolescents with autism and found a congruency effect that was not modulated by alignment, a result which was interpreted as reflecting qualitatively different face processing mechanisms. In the present study we tested adults with ASD in a composite face task where presentation times were manipulated and further explored whether these participants were sensitive to holistic information in faces using a new version of the composite task: VHFPT 2.0 (The Vanderbilt Holistic Face Processing Test 2.0). Results suggest that adults with ASD process faces holistically and that their facial identity processing abilities are qualitatively similar and as efficient as that of typical adults. The difference between the results of Gauthier et al. (2009) with adolescents and the results with adults here reported are interpreted in terms of a developmental delay. 相似文献
117.
This study aimed to examine the role of reinvestment - the propensity to consciously monitor and control actions (movement specific reinvestment) and to consciously monitor and evaluate decision making processes (Decision specific reinvestment) while driving in everyday risky scenarios. The study also aimed to evaluate the association between reinvestment and previously validated driver attitude measures. Fifty one participants completed a series of questionnaires (Driving Self-Efficacy Scale, Driver Attitude Questionnaire, Movement Specific Reinvestment Scale, Decision Specific Reinvestment Scale) after which they completed a test phase in a driving simulator. In the test phase, driving scenarios included roads with different markings (i.e., double yellow, wide centrelines, wire rope barriers, Audio Tactile Profiled markings) and alerting scenarios (i.e., police car present, high crash risk area sign, reduced speed zone). Results revealed that on risky roads (wide centrelines), participants with a high propensity for decision specific reinvestment drove slower than those with a low propensity. Driver experience, attitudes towards speeding and scores on the Decision Reinvestment subscale of the Decision Specific Reinvestment Scale significantly predicted speed choice. More experienced participants with higher scores on the Decision Reinvestment subscale were more likely to drive slower and participants with worse attitudes towards speeding were likely to drive faster. Participants with a low propensity for movement specific reinvestment (specifically, Movement Self-Consciousness) reduced their speed to a greater extent than those with a high propensity when driving in the police car scenario. There was some evidence to suggest that high decision specific and movement specific reinvesters were more likely to be involved in crashes and receive driving infringements. The current study is the first to demonstrate a significant relationship between reinvestment and driving. The implications of these findings for road safety are discussed. 相似文献
118.
119.
The privacy of patients is jeopardised when medical records and data are spread or shared beyond the protected cloud of institutions. This is because breaches force them to the brink that they start abstaining from full disclosure of their condition. This type of condition has a negative effect on scientific research, patients and all stakeholders. A blockchain-based data sharing system is proposed to tackle this issue, which employs immutability and autonomy properties of the blockchain to sufficiently resolve challenges associated with access control and handle sensitive data. Our proposed system is supported by a Discrete Wavelet Transform to enhance the overall security, and a Genetic Algorithm technique to optimise the queuing optimization technique as well. Introducing this cryptographic key generator enhances the immunity and system access control, which allows verifying users securely in a fast way. This design allows further accountability since all users involved are already known and the blockchain records a log of their actions. Only when the users’ cryptographic keys and identities are confirmed, the system allows requesting data from the shared queuing requests. The achieved execution time per node, confirmation time per node and robust index for block number of 0.19 s, 0.17 s and 20 respectively that based on system evaluation illustrates that our system is robust, efficient, immune and scalable. 相似文献
120.