首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   668篇
  免费   54篇
  国内免费   42篇
  2024年   3篇
  2023年   26篇
  2022年   25篇
  2021年   28篇
  2020年   45篇
  2019年   41篇
  2018年   33篇
  2017年   40篇
  2016年   42篇
  2015年   14篇
  2014年   22篇
  2013年   65篇
  2012年   13篇
  2011年   12篇
  2010年   8篇
  2009年   17篇
  2008年   17篇
  2007年   20篇
  2006年   22篇
  2005年   24篇
  2004年   16篇
  2003年   14篇
  2002年   20篇
  2001年   9篇
  2000年   11篇
  1999年   6篇
  1998年   8篇
  1997年   6篇
  1996年   7篇
  1995年   16篇
  1994年   3篇
  1993年   8篇
  1992年   7篇
  1991年   8篇
  1990年   6篇
  1989年   12篇
  1988年   9篇
  1987年   5篇
  1986年   5篇
  1985年   4篇
  1984年   4篇
  1983年   6篇
  1982年   6篇
  1981年   3篇
  1980年   4篇
  1979年   15篇
  1978年   9篇
  1977年   8篇
  1976年   7篇
  1974年   2篇
排序方式: 共有764条查询结果,搜索用时 15 毫秒
51.
This paper examined conceptual versus perceptual priming in identification of incomplete pictures by using a short-term priming paradigm, in which information that may be useful in identifying a fragmented target is presented just prior to the target’s presentation. The target was a picture that slowly and continuously became complete and the participants were required to press a key as soon as they knew what it was. Each target was preceded by a visual prime. The nature of this prime varied from very conceptual (e.g., the name of the picture’s category) to very perceptual (e.g., a similar-shaped pictorial prime from a different category). Primes also included those that combined perceptual and conceptual information (e.g., names or images of the target picture). Across three experiments, conceptual primes were effective while the purely perceptual primes were not. Accordingly, we conclude that pictures in this type of task are identified primarily by conceptual processing, with perceptual processing contributing relatively little.  相似文献   
52.
Tucker3 hierarchical classes analysis   总被引:1,自引:0,他引:1  
This paper presents a new model for binary three-way three-mode data, called Tucker3 hierarchical classes model (Tucker3-HICLAS). This new model generalizes Leenen, Van Mechelen, De Boeck, and Rosenberg's (1999) individual differences hierarchical classes model (INDCLAS). Like the INDCLAS model, the Tucker3-HICLAS model includes a hierarchical classification of the elements of each mode, and a linking structure among the three hierarchies. Unlike INDCLAS, Tucker3-HICLAS (a) does not restrict the hierarchical classifications of the three modes to have the same rank, and (b) allows for more complex linking structures among the three hierarchies. An algorithm to fit the Tucker3-HICLAS model is described and evaluated in an extensive simulation study. An application of the model to hostility data is discussed.The first author is a Research Assistant of the Fund for Scientific Research-Flanders (Belgium). The research reported in this paper was partially supported by the Research Council of K.U. Leuven (GOA/2000/02). We are grateful to Kristof Vansteelandt for providing us with an interesting data set.  相似文献   
53.
This paper informally summarizes a two-day symposium held at the U.S. National Academy of Sciences in Washington, D.C., September 5–6, 2002. The issue was to what extent the progress of science and societal capacity for continued technological innovation are threatened by excessive protection of intellectual property. Excessive protection creates disadvantages not only for scientists and inventors but also for educators/students and for librarians/clientele. Speakers from a variety of disciplines and institutions agreed unanimously that scientific and technological progress is, indeed, under serious threat. Various opinions were expressed about the degree of threat, currently and prospectively, as well as what counter-measures are best suited to resist undue restrictions on creative uses of scientific and technical data and information. This summary is based entirely on the author’s notes from the symposium, and the commentary offered is his alone. My apologies to the speakers if this paper does not accurately reflect the primary intent of their presentations. The “Suggested Readings” offered at the end are not specific to the speakers’ statements but rather are offered as a general resource to aid further research. The definitive record of the symposium is planned to be available from the National Academies Press as a Proceedings publication in the summer of 2003. John Gardenier is an independent researcher, ethicist and science writer.  相似文献   
54.
In this paper, the constrained maximum likelihood estimation of a two-level covariance structure model with unbalanced designs is considered. The two-level model is reformulated as a single-level model by treating the group level latent random vectors as hypothetical missing-data. Then, the popular EM algorithm is extended to obtain the constrained maximum likelihood estimates. For general nonlinear constraints, the multiplier method is used at theM-step to find the constrained minimum of the conditional expectation. An accelerated EM gradient procedure is derived to handle linear constraints. The empirical performance of the proposed EM type algorithms is illustrated by some artifical and real examples.This research was supported by a Hong Kong UCG Earmarked Grant, CUHK 4026/97H. We are greatly indebted to D.E. Morisky and J.A. Stein for the use of their AIDS data in our example. We also thank the Editor, two anonymous reviewers, W.Y. Poon and H.T. Zhu for constructive suggestions and comments in improving the paper. The assistance of Michael K.H. Leung and Esther L.S. Tam is gratefully acknowledged.  相似文献   
55.
We used the take‐the‐best heuristic to develop a model to forecast the popular two‐party vote shares in U.S. presidential elections. The model draws upon information about how voters expect the candidates to deal with the most important issue facing the country. We used cross‐validation to calculate a total of 1000 out‐of‐sample forecasts, one for each of the last 100 days of the ten U.S. presidential elections from 1972 to 2008. Ninety‐seven per cent of forecasts correctly predicted the winner of the popular vote. The model forecasts were competitive compared to forecasts from methods that incorporate substantially more information (e.g., econometric models and the Iowa Electronic Markets). The purpose of the model is to provide fast advice on which issues candidates should stress in their campaign. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   
56.
The commentary discusses several topics in Dr. Iacobucci's article on mediation analysis with categorical variables including the lack of equivalency of mediated effect measures, ab, and cc′, that are algebraically equivalent in ordinary least squares regression models. The commentary raises the issue of correlated mediation coefficients and presents formulas to include the correlation in the test of significance. References to new developments in causal mediation analysis for categorical variables are given and the importance of programs of research to establish a mediation theory is emphasized.  相似文献   
57.
This paper provides an overview and task analysis for creating a continuous ABC data‐collection application using Xcode on a Mac computer. Behavior analysts can program an ABC data collection system, complete with a customized list of target clients, antecedents, behaviors, and consequences to be recorded, and have the data automatically sent to an e‐mail account after observations have concluded. Further suggestions are provided to customize the ABC data‐ collection system for individual preferences and clinical needs.  相似文献   
58.
Presently, the collection and analysis of naturalistic data is the most credited method for understanding road user behavior and improving traffic safety. Such methodology was developed for motorized vehicles, such as cars and trucks, and is still largely applied to those vehicles. However, a reasonable question is whether bicycle safety can also benefit from the naturalistic methodology, once collection and analyses are properly ported from motorized vehicles to bicycles. This paper answers this question by showing that instrumented bicycles can also collect analogous naturalistic data. In addition, this paper shows how naturalistic cycling data from 16 bicyclists can be used to estimate risk while cycling. The results show that cycling near an intersection increased the risk of experiencing a critical event by four times, and by twelve times when the intersection presented some form of visual occlusion (e.g., buildings and hedges). Poor maintenance of the road increased the risk tenfold. Furthermore, the risk of experiencing a critical event was twice as large when at least one pedestrian or another bicyclist crossed the bicyclist’s trajectory. Finally, this study suggests the two most common scenarios for bicycle accidents, which result from different situations and thus require different countermeasures. The findings presented in this paper show that bicycle safety can benefit from the naturalistic methodology, which provides data able to guide development and evaluation of (intelligent) countermeasures to increase cycling safety.  相似文献   
59.
A large body of research has investigated the psycho-organizational variables predicting satisfaction at work, but few studies have so far examined variables in the field of environmental psychology. Our study aims first to identify the impact of variables evaluating comfort at work (satisfaction with the work environment, attachment to the workplace) by comparing them with organizational variables known to be related to job satisfaction, and then to rank the relationships between these variables in a pseudo- implication sequence, based on statistical implicative analysis. The study involved 105 bank employees and confirms our theoretical model, showing that job satisfaction can be explained implicatively by the three other variables [(Comfort/Functionality => Control/privacy) => Workplace attachment] => job satisfaction.  相似文献   
60.
Ethnic identity is defined in terms of the interaction between exploration of and commitment to a given cultural background. The present study investigated the effect of individual background, role transitions, and the social environment on the development of ethnic identity in a sample of German adults aged 21–73 years (N = 2,940). Additionally, identity transitions and the moderating effect of disequilibrating life events on identity over time were examined (N = 827). Overall, results are consistent with findings for other identity domains: Respondents could be assigned to one of four identity stages, ranging from unexamined to achieved identity. Particularly, the individual background and the extent of community involvement affected ethnic identity formation in adulthood. Longitudinal analyses revealed that only one-third of respondents had remained in the same identity stage; most individuals had transitioned forward or backward. Changes in ethnic identity were not moderated by disequilibrating life events.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号