首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   556篇
  免费   112篇
  国内免费   44篇
  2023年   9篇
  2022年   11篇
  2021年   21篇
  2020年   43篇
  2019年   36篇
  2018年   39篇
  2017年   31篇
  2016年   42篇
  2015年   21篇
  2014年   46篇
  2013年   93篇
  2012年   16篇
  2011年   36篇
  2010年   29篇
  2009年   28篇
  2008年   21篇
  2007年   24篇
  2006年   20篇
  2005年   18篇
  2004年   14篇
  2003年   15篇
  2002年   8篇
  2001年   13篇
  2000年   4篇
  1999年   7篇
  1998年   9篇
  1997年   2篇
  1996年   6篇
  1995年   2篇
  1994年   5篇
  1993年   9篇
  1992年   2篇
  1991年   2篇
  1990年   2篇
  1989年   1篇
  1988年   2篇
  1987年   1篇
  1986年   1篇
  1985年   2篇
  1984年   2篇
  1983年   2篇
  1982年   4篇
  1981年   1篇
  1980年   2篇
  1979年   4篇
  1978年   1篇
  1976年   3篇
  1975年   2篇
排序方式: 共有712条查询结果,搜索用时 31 毫秒
11.
The validity and temporal stability of the chimeric face technique as a measure of cerebral hemispheric functioning in children were investigated. The method is based upon the observation that when a subject encounters a representation of the human face, the left side (from the observer's point of view) of the face dominates his or her perception of it. This bias was shown to be present in a majority of children ranging from 6 through 14 years old, and it was stronger for right-handers than for left-handers. The 1-month temporal stability of the bias was 67%, which is comparable to that of other surface methods. As in other split-message techniques, the typical left visual field bias was more reliable than the unusual right visual field bias. The implications of these data are discussed.  相似文献   
12.
The author discusses current convergences and divergences concerning analytic practice. After presenting a clinical vignette that can be understood differently according to different theoretical approaches, he discusses Wallerstein’s proposal of a common ground in psychoanalysis and suggests that the present state of the art indicates that psychoanalysis is a pluralistic discipline, with different ways of training and practising it, and that the main challenge is to improve our ability to listen to and to learn from different approaches.  相似文献   
13.
Information manipulation and cognitive load imposition make the production of deceptive narratives difficult. But little is known about the production of deception, and how its mechanisms may help distinguish truthful from deceitful narratives. This study focuses on the measurement of keystroke dynamics while typing truthful and deceptive eyewitness testimonies after a baseline assessment. While typing their narrative, some participants would undergo an auditory cognitive load. Results show that liars typed their story slower, and in less time than the truthful participants when compared to their respective baselines. The imposition of the auditory cognitive load showed adverse results, enhancing the amount of keystrokes and the time necessary to type the narrative. Classification shows better results for deceptive narrative when no auditory cognitive load is imposed. These results are discussed in terms of expanding current models to include the cognition of linguistic production and writing strategies.  相似文献   
14.
The putative confession (PC) instructions (“[suspect] told me everything that happened and wants you to tell the truth”) increases children's honesty. However, research has shown that children who maintain secrecy despite the PC are more convincing. We examined whether (a) the PC undermines adults' deception detection abilities or (b) children who conceal despite the PC are better deceivers. Adults evaluated truthful and deceptive children interviewed with the PC where the PC portion of the interview was either present or absent. Adults' deception detection was no worse when the PC was present; in fact, it was slightly better. Rather than negatively affecting adults' ability to detect deception, the PC selects an unusually convincing group of concealers.  相似文献   
15.
Traffic congestion and crash rates can be reduced by introducing variable speed limits (VSLs) and automatic incident detection (AID) systems. Previous findings based on loop detector measurements have revealed that drivers reduce their speeds while approaching traffic congestion when the AID system is active. Notwithstanding these behavioural effects, most microscopic traffic flow models assessing the impact of VSLs do not describe driver response accurately.This study analyses the main factors that influence driver deceleration behaviour while approaching traffic congestion with and without VSLs. The Dutch VSL database was linked to the driver behaviour data collected in the UDRIVE naturalistic driving study. Driver engagement in secondary tasks and glance behaviour were extracted from the video data. Linear mixed-effects models predicting the characteristics of deceleration events were estimated.The results show that the maximum deceleration is high when approaching a slower leader, when driving at high speeds and short distance headways, and close to the beginning of traffic congestion. The minimum time headway is short when driving at high speeds and changing lanes. Certain drivers showed higher decelerations and shorter time headways than others. Controlled for these main factors, smaller maximum decelerations were found when the VSLs were present and visible, and when the gantries were within close proximity. These factors could be incorporated into microscopic traffic simulations to evaluate the impact of AID systems on traffic congestion more realistically. Further research is needed to clarify the link between engagement in secondary tasks, glance behaviour and deceleration behaviour.  相似文献   
16.
Intrusion Detection Systems (IDSs) is a system that monitors network traffic for suspicious activity and issues alert when such activity is revealed. Moreover, the existing IDSs-based methods are based on outdated attacks that unable to identify modern attacks or malicious trends. For this reason, in this study we developed a new multi-swarm adaptive grasshopper optimization algorithm to utilize adaptation mechanism in a group of swarms based on fuzzy logic to protect against sophisticated attacks. The proposed (MSAGOA) technique has the capability of global optimization and rapid convergence that are used to attain optimal feature subsets to identify attack types on IDS datasets. In the MSAGOA technique, learning engine as Extreme learning Machine, Naive Bayes, Random Forest and Decision Tree is applied as a fitness function to select the highly discriminating features and to maximize classification performance. Afterward, select the best classifier which works as a fitness function in our approach to measure the performance in terms of accuracy, detection rate, and false alarm rate. The simulations are performed on three IDS datasets such as NSL-KDD, AWID-ATK-R, and NGIDS-DS. The experimental results demonstrated that MSAGOA method has performed better and obtained high detection rate of 99.86%, accuracy of 99.89% in NSL-KDD and high detection rate of 98.73%, accuracy of 99.67% in AWID-ATK-R and detection rate of 89.50%, accuracy of 90.23% in NGIDS-DS. In addition, the performance is compared with several other existing techniques to show the efficacy of the proposed approach.  相似文献   
17.
社会心理学将阴谋论视作一种意识形态上的信念,并定义为人们将重大的政治或社会事件归因为有权力的群体或个人暗中预谋以达成其目的的解释倾向。社会认知视角为个体这种阴谋论信念的产生提供了三种解释。错觉模式感知导致人们认知上倾向于在不相关的事件之间建立联系;敏感性动因觉察影响人们过度感知并假定事件背后的动因、目的和意图等;投射是将自己愿意参与阴谋的意图归因于事件中的他人。  相似文献   
18.
19.
Errors in choice tasks are not only detected fast and reliably, participants often report that they knew that an error occurred already before a response was produced. These early error sensations stand in contrast with evidence suggesting that the earliest neural correlates of error awareness emerge around 300 ms after erroneous responses. The present study aimed to investigate whether anecdotal evidence for early error sensations can be corroborated in a controlled study in which participants provide metacognitive judgments on the subjective timing of error awareness. In Experiment 1, participants had to report whether they became aware of their errors before or after the response. In Experiment 2, we measured confidence in these metacognitive judgments. Our data show that participants report early error sensations with high confidence in the majority of error trials across paradigms and experiments. These results provide first evidence for early error sensations, informing theories of error awareness.  相似文献   
20.
Artificial intelligent systems often model the solutions of typical machine learning problems, inspired by biological processes, because of the biological system is faster and much adaptive than deep learning. The utility of bio-inspired learning methods lie in its ability to discover unknown patterns, and its less dependence on mathematical modeling or exhaustive training. In this paper, we propose a new bio-inspired learning model for a single-class classifier to detect abnormality in video object trajectories. The method uses a simple but dynamic extreme learning machine (ELM) and hierarchical temporal memory (HTM) together referred to as ELM-HTM in an unsupervised way to learn and classify time series patterns. The method has been tested on trajectory sequences in traffic surveillance to find abnormal behaviors such as high-speed, unusual stops, driving in wrong directions, loitering, etc. Experiments have also been performed with 3D air signatures captured using sensors and used for biometric authentication(forged/genuine). The results indicate a significant gain over training time and classification accuracy. The proposed method outperforms in predicting long-time patterns by observing small steps with an average accuracy gain of 15% as compared to the state-of-the-art HTM. The method has applications in detecting abnormal activities in videos by learning the movement patterns as well as in biometric authentication.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号