全文获取类型
收费全文 | 2013篇 |
免费 | 190篇 |
国内免费 | 365篇 |
专业分类
2568篇 |
出版年
2024年 | 3篇 |
2023年 | 43篇 |
2022年 | 54篇 |
2021年 | 74篇 |
2020年 | 86篇 |
2019年 | 146篇 |
2018年 | 103篇 |
2017年 | 130篇 |
2016年 | 117篇 |
2015年 | 75篇 |
2014年 | 116篇 |
2013年 | 409篇 |
2012年 | 92篇 |
2011年 | 139篇 |
2010年 | 72篇 |
2009年 | 117篇 |
2008年 | 119篇 |
2007年 | 97篇 |
2006年 | 78篇 |
2005年 | 77篇 |
2004年 | 88篇 |
2003年 | 74篇 |
2002年 | 65篇 |
2001年 | 40篇 |
2000年 | 30篇 |
1999年 | 19篇 |
1998年 | 11篇 |
1997年 | 21篇 |
1996年 | 12篇 |
1995年 | 13篇 |
1994年 | 8篇 |
1993年 | 9篇 |
1992年 | 7篇 |
1991年 | 1篇 |
1990年 | 4篇 |
1989年 | 3篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1984年 | 3篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
排序方式: 共有2568条查询结果,搜索用时 15 毫秒
121.
122.
在视觉搜索过程中,老年人是否可以在不同情境下调节自上而下和自下而上的加工水平尚不明确。为了探讨老化对认知灵活性的影响,研究采用空间线索范式,通过比较有效线索和无效线索来考察对线索的注意加工水平(注意捕获、注意抑制),通过比较目标相关和目标无关线索的注意加工水平来考察自上而下和自下而上的作用,通过改变分心物一致性来调控不同的目标凸显情境。结果发现,年轻组在目标非凸显时的空间线索效应高于目标凸显时,表明年轻人会依据目标凸显性调整自上而下的加工水平;但老年组却没有产生这种差异,其更依赖自上而下的加工,注意系统会对目标相关的线索进行注意捕获,对目标无关的线索进行注意抑制。结果表明,随着年龄的增长,认知控制的灵活性下降,表现出对自上而下加工较多的依赖;此外,老年人依然保留着注意捕获和注意抑制的能力,这对认知老化中抑制能力受损的观点提出了挑战。 相似文献
123.
Haochen Xu Guanhua Fang Zhiliang Ying 《The British journal of mathematical and statistical psychology》2020,73(3):474-505
We propose a latent topic model with a Markov transition for process data, which consists of time-stamped events recorded in a log file. Such data are becoming more widely available in computer-based educational assessment with complex problem-solving items. The proposed model can be viewed as an extension of the hierarchical Bayesian topic model with a hidden Markov structure to accommodate the underlying evolution of an examinee's latent state. Using topic transition probabilities along with response times enables us to capture examinees' learning trajectories, making clustering/classification more efficient. A forward-backward variational expectation-maximization (FB-VEM) algorithm is developed to tackle the challenging computational problem. Useful theoretical properties are established under certain asymptotic regimes. The proposed method is applied to a complex problem-solving item in the 2012 version of the Programme for International Student Assessment (PISA). 相似文献
124.
125.
Paulo Ventura Joana C. Carmo Cristiane Souza Fábio Martins Isabel Leite Sandra Pinho 《Visual cognition》2018,26(1):13-24
Are face recognition difficulties in Autism Spectrum Disorders (ASD) related to impaired holistic processing? Gauthier et al. [Gauthier, I., Klaiman, C., &; Schultz, R. T. (2009). Face composite effects reveal abnormal face processing in Autism spectrum disorders. Vision Research, 49, 470–478. doi:10.1016/j.visres.2008.12.007] used the face composite task in adolescents with autism and found a congruency effect that was not modulated by alignment, a result which was interpreted as reflecting qualitatively different face processing mechanisms. In the present study we tested adults with ASD in a composite face task where presentation times were manipulated and further explored whether these participants were sensitive to holistic information in faces using a new version of the composite task: VHFPT 2.0 (The Vanderbilt Holistic Face Processing Test 2.0). Results suggest that adults with ASD process faces holistically and that their facial identity processing abilities are qualitatively similar and as efficient as that of typical adults. The difference between the results of Gauthier et al. (2009) with adolescents and the results with adults here reported are interpreted in terms of a developmental delay. 相似文献
126.
This study aimed to examine the role of reinvestment - the propensity to consciously monitor and control actions (movement specific reinvestment) and to consciously monitor and evaluate decision making processes (Decision specific reinvestment) while driving in everyday risky scenarios. The study also aimed to evaluate the association between reinvestment and previously validated driver attitude measures. Fifty one participants completed a series of questionnaires (Driving Self-Efficacy Scale, Driver Attitude Questionnaire, Movement Specific Reinvestment Scale, Decision Specific Reinvestment Scale) after which they completed a test phase in a driving simulator. In the test phase, driving scenarios included roads with different markings (i.e., double yellow, wide centrelines, wire rope barriers, Audio Tactile Profiled markings) and alerting scenarios (i.e., police car present, high crash risk area sign, reduced speed zone). Results revealed that on risky roads (wide centrelines), participants with a high propensity for decision specific reinvestment drove slower than those with a low propensity. Driver experience, attitudes towards speeding and scores on the Decision Reinvestment subscale of the Decision Specific Reinvestment Scale significantly predicted speed choice. More experienced participants with higher scores on the Decision Reinvestment subscale were more likely to drive slower and participants with worse attitudes towards speeding were likely to drive faster. Participants with a low propensity for movement specific reinvestment (specifically, Movement Self-Consciousness) reduced their speed to a greater extent than those with a high propensity when driving in the police car scenario. There was some evidence to suggest that high decision specific and movement specific reinvesters were more likely to be involved in crashes and receive driving infringements. The current study is the first to demonstrate a significant relationship between reinvestment and driving. The implications of these findings for road safety are discussed. 相似文献
127.
128.
The privacy of patients is jeopardised when medical records and data are spread or shared beyond the protected cloud of institutions. This is because breaches force them to the brink that they start abstaining from full disclosure of their condition. This type of condition has a negative effect on scientific research, patients and all stakeholders. A blockchain-based data sharing system is proposed to tackle this issue, which employs immutability and autonomy properties of the blockchain to sufficiently resolve challenges associated with access control and handle sensitive data. Our proposed system is supported by a Discrete Wavelet Transform to enhance the overall security, and a Genetic Algorithm technique to optimise the queuing optimization technique as well. Introducing this cryptographic key generator enhances the immunity and system access control, which allows verifying users securely in a fast way. This design allows further accountability since all users involved are already known and the blockchain records a log of their actions. Only when the users’ cryptographic keys and identities are confirmed, the system allows requesting data from the shared queuing requests. The achieved execution time per node, confirmation time per node and robust index for block number of 0.19 s, 0.17 s and 20 respectively that based on system evaluation illustrates that our system is robust, efficient, immune and scalable. 相似文献
129.
130.