首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1973篇
  免费   175篇
  国内免费   341篇
  2489篇
  2024年   3篇
  2023年   39篇
  2022年   47篇
  2021年   77篇
  2020年   82篇
  2019年   143篇
  2018年   97篇
  2017年   130篇
  2016年   110篇
  2015年   76篇
  2014年   111篇
  2013年   409篇
  2012年   91篇
  2011年   140篇
  2010年   69篇
  2009年   125篇
  2008年   125篇
  2007年   92篇
  2006年   74篇
  2005年   75篇
  2004年   82篇
  2003年   72篇
  2002年   60篇
  2001年   34篇
  2000年   29篇
  1999年   16篇
  1998年   10篇
  1997年   18篇
  1996年   11篇
  1995年   10篇
  1994年   5篇
  1993年   6篇
  1992年   7篇
  1991年   1篇
  1990年   2篇
  1989年   2篇
  1988年   1篇
  1987年   1篇
  1985年   2篇
  1984年   2篇
  1980年   1篇
  1978年   1篇
  1977年   1篇
排序方式: 共有2489条查询结果,搜索用时 15 毫秒
111.
GoalTo apply signal processing and machine learning skills and knowledge in processing the EEG and MEG signal and further localize and evaluate the source of the finger stimulation.MethodsCognitive control is usually applied in information processing and behavioral response. In the preprocessing, baseline correction is implemented to analyze the pre-stimuli, combining ERP to mark the event related potential, studying the time-locked only behavior. Z-score transform, coherence and spec trum are calculated and analyzed in the functional connectivity analysis.In addition to the functional analysis, Bayes Optimizer evaluates the neuro imaging according to the hierarchical Bayes. The introduction of the application is described from both user and developer’s prospects. Results: Introduction of both user and developers aspects, on its modules from pre-processing, functional analysis and results visualization and evaluation is conducted with one specific clinical data case, including the correlation is higher especially on gamma band and the MVAR coherence on the whole source space depicting the relation between different regions, especially on somatosensory (compared by thalamus) when stimulated by finger activity, phase-lock property of the E/MEG signal and etc. Compared to a manual selection, the scaling parameter prediction can be improved with support vector machine (SVM). The evaluation results with Bayes Optimization, location prediction is superior in the somatosensory area and in the thalamus, the total reconstructed source space is larger, one of the realization of cognitive system comparing different kernels and classifiers. The SVM and discriminant classifier gives similar results evaluating the dipole localization and the parameter choice related as well to the shape parameter, noise level, hyperprior and etc.ConclusionApproaches of Brain Q are found to be suitable for pre-processing for the EEG and MEG data. The system is capable of functional analysis including coherence and spectral related computation. Machine learning techniques are conducted as well to analyze and evaluate the result of the dipole reconstruction and help to predict the better model parameters and the localization of the origin dipoles. A case on finger stimulation clinical data is conducted and the results of the analysis temporarily and spatially manifests its functionality for users and potential extensions for developers.  相似文献   
112.
发展性阅读障碍者的快速命名缺陷   总被引:1,自引:0,他引:1  
樊琪 《心理科学》2005,28(6):1375-1381
快速命名任务是一种需要命名多个高熟悉项目的认知任务,尤其适合用来对成因复杂的发展性阅读障碍进行研究。许多研究者使用不同类型的快速命名任务发现,发展性阅读障碍者的快速命名缺陷在眼动过程表现为中央凹和副中央凹的加工困难,在认知过程中表现为抑制能力较差等。未来的研究中应该注意到快速命名缺陷的复杂性,采用多种方法相结合的方式来探究快速命名缺陷的本质,从而建立系统性的假说。  相似文献   
113.
杏仁核是情绪信息加工的关键脑区。近年来心理学和神经科学领域发现了杏仁核情绪加工的效价特异性现象,并且整体存在左侧杏仁核对正性情绪、右侧杏仁核对负性情绪以及双侧杏仁核负性偏好的特异性趋势,且受到材料突出特征、个体差异、任务条件的调节。未来可进一步探索注意对杏仁核情绪效价特异性的调节作用,探究动态情绪刺激加工时杏仁核的活动特点,考察心理障碍患者加工负性情绪时的杏仁核激活模式,并确定杏仁核的效价特异性在思维、计划、决策等高级认知过程中的表现。  相似文献   
114.
在视觉搜索过程中,老年人是否可以在不同情境下调节自上而下和自下而上的加工水平尚不明确。为了探讨老化对认知灵活性的影响,研究采用空间线索范式,通过比较有效线索和无效线索来考察对线索的注意加工水平(注意捕获、注意抑制),通过比较目标相关和目标无关线索的注意加工水平来考察自上而下和自下而上的作用,通过改变分心物一致性来调控不同的目标凸显情境。结果发现,年轻组在目标非凸显时的空间线索效应高于目标凸显时,表明年轻人会依据目标凸显性调整自上而下的加工水平;但老年组却没有产生这种差异,其更依赖自上而下的加工,注意系统会对目标相关的线索进行注意捕获,对目标无关的线索进行注意抑制。结果表明,随着年龄的增长,认知控制的灵活性下降,表现出对自上而下加工较多的依赖;此外,老年人依然保留着注意捕获和注意抑制的能力,这对认知老化中抑制能力受损的观点提出了挑战。  相似文献   
115.
116.
Are face recognition difficulties in Autism Spectrum Disorders (ASD) related to impaired holistic processing? Gauthier et al. [Gauthier, I., Klaiman, C., &; Schultz, R. T. (2009). Face composite effects reveal abnormal face processing in Autism spectrum disorders. Vision Research, 49, 470–478. doi:10.1016/j.visres.2008.12.007] used the face composite task in adolescents with autism and found a congruency effect that was not modulated by alignment, a result which was interpreted as reflecting qualitatively different face processing mechanisms. In the present study we tested adults with ASD in a composite face task where presentation times were manipulated and further explored whether these participants were sensitive to holistic information in faces using a new version of the composite task: VHFPT 2.0 (The Vanderbilt Holistic Face Processing Test 2.0). Results suggest that adults with ASD process faces holistically and that their facial identity processing abilities are qualitatively similar and as efficient as that of typical adults. The difference between the results of Gauthier et al. (2009) with adolescents and the results with adults here reported are interpreted in terms of a developmental delay.  相似文献   
117.
This study aimed to examine the role of reinvestment - the propensity to consciously monitor and control actions (movement specific reinvestment) and to consciously monitor and evaluate decision making processes (Decision specific reinvestment) while driving in everyday risky scenarios. The study also aimed to evaluate the association between reinvestment and previously validated driver attitude measures. Fifty one participants completed a series of questionnaires (Driving Self-Efficacy Scale, Driver Attitude Questionnaire, Movement Specific Reinvestment Scale, Decision Specific Reinvestment Scale) after which they completed a test phase in a driving simulator. In the test phase, driving scenarios included roads with different markings (i.e., double yellow, wide centrelines, wire rope barriers, Audio Tactile Profiled markings) and alerting scenarios (i.e., police car present, high crash risk area sign, reduced speed zone). Results revealed that on risky roads (wide centrelines), participants with a high propensity for decision specific reinvestment drove slower than those with a low propensity. Driver experience, attitudes towards speeding and scores on the Decision Reinvestment subscale of the Decision Specific Reinvestment Scale significantly predicted speed choice. More experienced participants with higher scores on the Decision Reinvestment subscale were more likely to drive slower and participants with worse attitudes towards speeding were likely to drive faster. Participants with a low propensity for movement specific reinvestment (specifically, Movement Self-Consciousness) reduced their speed to a greater extent than those with a high propensity when driving in the police car scenario. There was some evidence to suggest that high decision specific and movement specific reinvesters were more likely to be involved in crashes and receive driving infringements. The current study is the first to demonstrate a significant relationship between reinvestment and driving. The implications of these findings for road safety are discussed.  相似文献   
118.
119.
The privacy of patients is jeopardised when medical records and data are spread or shared beyond the protected cloud of institutions. This is because breaches force them to the brink that they start abstaining from full disclosure of their condition. This type of condition has a negative effect on scientific research, patients and all stakeholders. A blockchain-based data sharing system is proposed to tackle this issue, which employs immutability and autonomy properties of the blockchain to sufficiently resolve challenges associated with access control and handle sensitive data. Our proposed system is supported by a Discrete Wavelet Transform to enhance the overall security, and a Genetic Algorithm technique to optimise the queuing optimization technique as well. Introducing this cryptographic key generator enhances the immunity and system access control, which allows verifying users securely in a fast way. This design allows further accountability since all users involved are already known and the blockchain records a log of their actions. Only when the users’ cryptographic keys and identities are confirmed, the system allows requesting data from the shared queuing requests. The achieved execution time per node, confirmation time per node and robust index for block number of 0.19 s, 0.17 s and 20 respectively that based on system evaluation illustrates that our system is robust, efficient, immune and scalable.  相似文献   
120.
张丽  蒋慧  赵立 《心理科学》2018,(2):337-343
本研究拟考察发展性计算障碍儿童的认知缺陷成因。实验1要求被试在三种形式(点/点,数/数,点/数)下进行数量比较,实验2仅将点集替换为汉字数字词。结果表明障碍组和正常组在数/数、点/数和汉字/汉字比较任务上的成绩存在显著差异,而在点/点和汉字/汉字比较上没有差异。据此推论,计算障碍儿童符号加工能力受到损伤,符号与非符号数量转换能力存在缺陷,但非符号加工能力和不同符号间数量转换没有缺陷,支持语义提取缺陷假设。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号