全文获取类型
收费全文 | 1468篇 |
免费 | 213篇 |
国内免费 | 107篇 |
出版年
2023年 | 27篇 |
2022年 | 26篇 |
2021年 | 41篇 |
2020年 | 76篇 |
2019年 | 95篇 |
2018年 | 92篇 |
2017年 | 80篇 |
2016年 | 97篇 |
2015年 | 59篇 |
2014年 | 70篇 |
2013年 | 248篇 |
2012年 | 40篇 |
2011年 | 73篇 |
2010年 | 42篇 |
2009年 | 84篇 |
2008年 | 66篇 |
2007年 | 79篇 |
2006年 | 76篇 |
2005年 | 69篇 |
2004年 | 47篇 |
2003年 | 57篇 |
2002年 | 33篇 |
2001年 | 27篇 |
2000年 | 20篇 |
1999年 | 22篇 |
1998年 | 23篇 |
1997年 | 12篇 |
1996年 | 12篇 |
1995年 | 12篇 |
1994年 | 14篇 |
1993年 | 15篇 |
1992年 | 9篇 |
1991年 | 6篇 |
1990年 | 6篇 |
1989年 | 5篇 |
1988年 | 6篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1979年 | 4篇 |
1976年 | 2篇 |
1975年 | 1篇 |
排序方式: 共有1788条查询结果,搜索用时 15 毫秒
31.
Language skills and mathematical competencies are argued to influence each other during development. While a relation between the development of vocabulary size and mathematical skills is already documented in the literature, this study further examines how children’s ability to map a novel word to an unknown object as well as their ability to retain this word from memory may be related to their knowledge of number words. Twenty-five children were tested longitudinally (at 30 and at 36 months of age) using an eye-tracking-based fast mapping task, the Give-a-Number task, and standardized measures of vocabulary. The results reveal that children’s ability to create and retain a mental representation of a novel word was related to number knowledge at 30 months, but not at 36 months while vocabulary size correlated with number knowledge only at 36 months. These results show that even specific mapping processes are initially related to the acquisition of number words and they speak for a parallelism between the development of lexical and number-concept knowledge despite their semantic and syntactic differences. 相似文献
32.
Frdric Tomas Ioannis Tsimperidis Samuel Demarchi Farid El Massioui 《Applied cognitive psychology》2021,35(1):112-122
Information manipulation and cognitive load imposition make the production of deceptive narratives difficult. But little is known about the production of deception, and how its mechanisms may help distinguish truthful from deceitful narratives. This study focuses on the measurement of keystroke dynamics while typing truthful and deceptive eyewitness testimonies after a baseline assessment. While typing their narrative, some participants would undergo an auditory cognitive load. Results show that liars typed their story slower, and in less time than the truthful participants when compared to their respective baselines. The imposition of the auditory cognitive load showed adverse results, enhancing the amount of keystrokes and the time necessary to type the narrative. Classification shows better results for deceptive narrative when no auditory cognitive load is imposed. These results are discussed in terms of expanding current models to include the cognition of linguistic production and writing strategies. 相似文献
33.
Jennifer Gongola Jodi A. Quas Steven E. Clark Thomas D. Lyon 《Applied cognitive psychology》2021,35(1):18-25
The putative confession (PC) instructions (“[suspect] told me everything that happened and wants you to tell the truth”) increases children's honesty. However, research has shown that children who maintain secrecy despite the PC are more convincing. We examined whether (a) the PC undermines adults' deception detection abilities or (b) children who conceal despite the PC are better deceivers. Adults evaluated truthful and deceptive children interviewed with the PC where the PC portion of the interview was either present or absent. Adults' deception detection was no worse when the PC was present; in fact, it was slightly better. Rather than negatively affecting adults' ability to detect deception, the PC selects an unusually convincing group of concealers. 相似文献
34.
Traffic congestion and crash rates can be reduced by introducing variable speed limits (VSLs) and automatic incident detection (AID) systems. Previous findings based on loop detector measurements have revealed that drivers reduce their speeds while approaching traffic congestion when the AID system is active. Notwithstanding these behavioural effects, most microscopic traffic flow models assessing the impact of VSLs do not describe driver response accurately.This study analyses the main factors that influence driver deceleration behaviour while approaching traffic congestion with and without VSLs. The Dutch VSL database was linked to the driver behaviour data collected in the UDRIVE naturalistic driving study. Driver engagement in secondary tasks and glance behaviour were extracted from the video data. Linear mixed-effects models predicting the characteristics of deceleration events were estimated.The results show that the maximum deceleration is high when approaching a slower leader, when driving at high speeds and short distance headways, and close to the beginning of traffic congestion. The minimum time headway is short when driving at high speeds and changing lanes. Certain drivers showed higher decelerations and shorter time headways than others. Controlled for these main factors, smaller maximum decelerations were found when the VSLs were present and visible, and when the gantries were within close proximity. These factors could be incorporated into microscopic traffic simulations to evaluate the impact of AID systems on traffic congestion more realistically. Further research is needed to clarify the link between engagement in secondary tasks, glance behaviour and deceleration behaviour. 相似文献
35.
Intrusion Detection Systems (IDSs) is a system that monitors network traffic for suspicious activity and issues alert when such activity is revealed. Moreover, the existing IDSs-based methods are based on outdated attacks that unable to identify modern attacks or malicious trends. For this reason, in this study we developed a new multi-swarm adaptive grasshopper optimization algorithm to utilize adaptation mechanism in a group of swarms based on fuzzy logic to protect against sophisticated attacks. The proposed (MSAGOA) technique has the capability of global optimization and rapid convergence that are used to attain optimal feature subsets to identify attack types on IDS datasets. In the MSAGOA technique, learning engine as Extreme learning Machine, Naive Bayes, Random Forest and Decision Tree is applied as a fitness function to select the highly discriminating features and to maximize classification performance. Afterward, select the best classifier which works as a fitness function in our approach to measure the performance in terms of accuracy, detection rate, and false alarm rate. The simulations are performed on three IDS datasets such as NSL-KDD, AWID-ATK-R, and NGIDS-DS. The experimental results demonstrated that MSAGOA method has performed better and obtained high detection rate of 99.86%, accuracy of 99.89% in NSL-KDD and high detection rate of 98.73%, accuracy of 99.67% in AWID-ATK-R and detection rate of 89.50%, accuracy of 90.23% in NGIDS-DS. In addition, the performance is compared with several other existing techniques to show the efficacy of the proposed approach. 相似文献
36.
37.
38.
This study investigated how creative personality, psychological empowerment, and job stress affect creative self-efficacy and innovative behavior in hospitality employees. A hypothesized moderating role of knowledge-sharing role in the relationship between creative self-efficacy and innovative behavior was also tested. Three hundred and thirty-nine employees and 89 supervisors employed by International Tourist Hotels in Taiwan participated in the study. A structural equation modeling analysis indicated that creative self-efficacy significantly mediates the effects of creative personality and psychological empowerment on innovative behavior in the hospitality industry. The positive effect of creative self-efficacy on innovative behavior was larger in high knowledge-sharing work environments than in low knowledge-sharing work environments. Theoretical and practical implications are further discussed. 相似文献
39.
Christopher J. Hartwell Michael A. Campion 《International Journal of Selection & Assessment》2020,28(1):1-16
The use of social networking websites (SNWs) during employee selection is gaining popularity in organizations. Using a foundation that integrates identity and situational strength theories, we develop a conceptual framework that differentiates SNW information from information gathered through traditional selection procedures, and distinguishes between SNW types. Research questions and hypotheses are tested using a survey of 291 hiring professionals. Results indicate that SNW content is considered useful and is regularly utilized during hiring. Some SNW content is viewed positively (e.g., information supporting qualifications), while other information leads to negative perceptions (e.g., discriminatory comments). Finally, results support a differentiation between personal and professional SNW, as the kind of information sought and the effectiveness of assessing various work‐related constructs differs between these SNW categories. 相似文献
40.
Errors in choice tasks are not only detected fast and reliably, participants often report that they knew that an error occurred already before a response was produced. These early error sensations stand in contrast with evidence suggesting that the earliest neural correlates of error awareness emerge around 300 ms after erroneous responses. The present study aimed to investigate whether anecdotal evidence for early error sensations can be corroborated in a controlled study in which participants provide metacognitive judgments on the subjective timing of error awareness. In Experiment 1, participants had to report whether they became aware of their errors before or after the response. In Experiment 2, we measured confidence in these metacognitive judgments. Our data show that participants report early error sensations with high confidence in the majority of error trials across paradigms and experiments. These results provide first evidence for early error sensations, informing theories of error awareness. 相似文献