全文获取类型
收费全文 | 668篇 |
免费 | 54篇 |
国内免费 | 42篇 |
出版年
2024年 | 3篇 |
2023年 | 26篇 |
2022年 | 25篇 |
2021年 | 28篇 |
2020年 | 45篇 |
2019年 | 41篇 |
2018年 | 33篇 |
2017年 | 40篇 |
2016年 | 42篇 |
2015年 | 14篇 |
2014年 | 22篇 |
2013年 | 65篇 |
2012年 | 13篇 |
2011年 | 12篇 |
2010年 | 8篇 |
2009年 | 17篇 |
2008年 | 17篇 |
2007年 | 20篇 |
2006年 | 22篇 |
2005年 | 24篇 |
2004年 | 16篇 |
2003年 | 14篇 |
2002年 | 20篇 |
2001年 | 9篇 |
2000年 | 11篇 |
1999年 | 6篇 |
1998年 | 8篇 |
1997年 | 6篇 |
1996年 | 7篇 |
1995年 | 16篇 |
1994年 | 3篇 |
1993年 | 8篇 |
1992年 | 7篇 |
1991年 | 8篇 |
1990年 | 6篇 |
1989年 | 12篇 |
1988年 | 9篇 |
1987年 | 5篇 |
1986年 | 5篇 |
1985年 | 4篇 |
1984年 | 4篇 |
1983年 | 6篇 |
1982年 | 6篇 |
1981年 | 3篇 |
1980年 | 4篇 |
1979年 | 15篇 |
1978年 | 9篇 |
1977年 | 8篇 |
1976年 | 7篇 |
1974年 | 2篇 |
排序方式: 共有764条查询结果,搜索用时 15 毫秒
51.
This paper examined conceptual versus perceptual priming in identification of incomplete pictures by using a short-term priming
paradigm, in which information that may be useful in identifying a fragmented target is presented just prior to the target’s
presentation. The target was a picture that slowly and continuously became complete and the participants were required to
press a key as soon as they knew what it was. Each target was preceded by a visual prime. The nature of this prime varied
from very conceptual (e.g., the name of the picture’s category) to very perceptual (e.g., a similar-shaped pictorial prime
from a different category). Primes also included those that combined perceptual and conceptual information (e.g., names or
images of the target picture). Across three experiments, conceptual primes were effective while the purely perceptual primes
were not. Accordingly, we conclude that pictures in this type of task are identified primarily by conceptual processing, with
perceptual processing contributing relatively little. 相似文献
52.
Tucker3 hierarchical classes analysis 总被引:1,自引:0,他引:1
This paper presents a new model for binary three-way three-mode data, called Tucker3 hierarchical classes model (Tucker3-HICLAS). This new model generalizes Leenen, Van Mechelen, De Boeck, and Rosenberg's (1999) individual differences hierarchical classes model (INDCLAS). Like the INDCLAS model, the Tucker3-HICLAS model includes a hierarchical classification of the elements of each mode, and a linking structure among the three hierarchies. Unlike INDCLAS, Tucker3-HICLAS (a) does not restrict the hierarchical classifications of the three modes to have the same rank, and (b) allows for more complex linking structures among the three hierarchies. An algorithm to fit the Tucker3-HICLAS model is described and evaluated in an extensive simulation study. An application of the model to hostility data is discussed.The first author is a Research Assistant of the Fund for Scientific Research-Flanders (Belgium). The research reported in this paper was partially supported by the Research Council of K.U. Leuven (GOA/2000/02). We are grateful to Kristof Vansteelandt for providing us with an interesting data set. 相似文献
53.
Gardenier JS 《Science and engineering ethics》2003,9(3):425-434
This paper informally summarizes a two-day symposium held at the U.S. National Academy of Sciences in Washington, D.C., September
5–6, 2002. The issue was to what extent the progress of science and societal capacity for continued technological innovation
are threatened by excessive protection of intellectual property. Excessive protection creates disadvantages not only for scientists
and inventors but also for educators/students and for librarians/clientele. Speakers from a variety of disciplines and institutions
agreed unanimously that scientific and technological progress is, indeed, under serious threat. Various opinions were expressed
about the degree of threat, currently and prospectively, as well as what counter-measures are best suited to resist undue
restrictions on creative uses of scientific and technical data and information. This summary is based entirely on the author’s
notes from the symposium, and the commentary offered is his alone. My apologies to the speakers if this paper does not accurately
reflect the primary intent of their presentations. The “Suggested Readings” offered at the end are not specific to the speakers’
statements but rather are offered as a general resource to aid further research. The definitive record of the symposium is
planned to be available from the National Academies Press as a Proceedings publication in the summer of 2003.
John Gardenier is an independent researcher, ethicist and science writer. 相似文献
54.
In this paper, the constrained maximum likelihood estimation of a two-level covariance structure model with unbalanced designs is considered. The two-level model is reformulated as a single-level model by treating the group level latent random vectors as hypothetical missing-data. Then, the popular EM algorithm is extended to obtain the constrained maximum likelihood estimates. For general nonlinear constraints, the multiplier method is used at theM-step to find the constrained minimum of the conditional expectation. An accelerated EM gradient procedure is derived to handle linear constraints. The empirical performance of the proposed EM type algorithms is illustrated by some artifical and real examples.This research was supported by a Hong Kong UCG Earmarked Grant, CUHK 4026/97H. We are greatly indebted to D.E. Morisky and J.A. Stein for the use of their AIDS data in our example. We also thank the Editor, two anonymous reviewers, W.Y. Poon and H.T. Zhu for constructive suggestions and comments in improving the paper. The assistance of Michael K.H. Leung and Esther L.S. Tam is gratefully acknowledged. 相似文献
55.
We used the take‐the‐best heuristic to develop a model to forecast the popular two‐party vote shares in U.S. presidential elections. The model draws upon information about how voters expect the candidates to deal with the most important issue facing the country. We used cross‐validation to calculate a total of 1000 out‐of‐sample forecasts, one for each of the last 100 days of the ten U.S. presidential elections from 1972 to 2008. Ninety‐seven per cent of forecasts correctly predicted the winner of the popular vote. The model forecasts were competitive compared to forecasts from methods that incorporate substantially more information (e.g., econometric models and the Iowa Electronic Markets). The purpose of the model is to provide fast advice on which issues candidates should stress in their campaign. Copyright © 2010 John Wiley & Sons, Ltd. 相似文献
56.
The commentary discusses several topics in Dr. Iacobucci's article on mediation analysis with categorical variables including the lack of equivalency of mediated effect measures, ab, and c–c′, that are algebraically equivalent in ordinary least squares regression models. The commentary raises the issue of correlated mediation coefficients and presents formulas to include the correlation in the test of significance. References to new developments in causal mediation analysis for categorical variables are given and the importance of programs of research to establish a mediation theory is emphasized. 相似文献
57.
This paper provides an overview and task analysis for creating a continuous ABC data‐collection application using Xcode on a Mac computer. Behavior analysts can program an ABC data collection system, complete with a customized list of target clients, antecedents, behaviors, and consequences to be recorded, and have the data automatically sent to an e‐mail account after observations have concluded. Further suggestions are provided to customize the ABC data‐ collection system for individual preferences and clinical needs. 相似文献
58.
Presently, the collection and analysis of naturalistic data is the most credited method for understanding road user behavior and improving traffic safety. Such methodology was developed for motorized vehicles, such as cars and trucks, and is still largely applied to those vehicles. However, a reasonable question is whether bicycle safety can also benefit from the naturalistic methodology, once collection and analyses are properly ported from motorized vehicles to bicycles. This paper answers this question by showing that instrumented bicycles can also collect analogous naturalistic data. In addition, this paper shows how naturalistic cycling data from 16 bicyclists can be used to estimate risk while cycling. The results show that cycling near an intersection increased the risk of experiencing a critical event by four times, and by twelve times when the intersection presented some form of visual occlusion (e.g., buildings and hedges). Poor maintenance of the road increased the risk tenfold. Furthermore, the risk of experiencing a critical event was twice as large when at least one pedestrian or another bicyclist crossed the bicyclist’s trajectory. Finally, this study suggests the two most common scenarios for bicycle accidents, which result from different situations and thus require different countermeasures. The findings presented in this paper show that bicycle safety can benefit from the naturalistic methodology, which provides data able to guide development and evaluation of (intelligent) countermeasures to increase cycling safety. 相似文献
59.
《Psychologie du Travail et des Organisations》2014,20(3):275-293
A large body of research has investigated the psycho-organizational variables predicting satisfaction at work, but few studies have so far examined variables in the field of environmental psychology. Our study aims first to identify the impact of variables evaluating comfort at work (satisfaction with the work environment, attachment to the workplace) by comparing them with organizational variables known to be related to job satisfaction, and then to rank the relationships between these variables in a pseudo- implication sequence, based on statistical implicative analysis. The study involved 105 bank employees and confirms our theoretical model, showing that job satisfaction can be explained implicatively by the three other variables [(Comfort/Functionality => Control/privacy) => Workplace attachment] => job satisfaction. 相似文献
60.
Débora B. Maehler 《The British journal of developmental psychology》2022,40(1):46-72
Ethnic identity is defined in terms of the interaction between exploration of and commitment to a given cultural background. The present study investigated the effect of individual background, role transitions, and the social environment on the development of ethnic identity in a sample of German adults aged 21–73 years (N = 2,940). Additionally, identity transitions and the moderating effect of disequilibrating life events on identity over time were examined (N = 827). Overall, results are consistent with findings for other identity domains: Respondents could be assigned to one of four identity stages, ranging from unexamined to achieved identity. Particularly, the individual background and the extent of community involvement affected ethnic identity formation in adulthood. Longitudinal analyses revealed that only one-third of respondents had remained in the same identity stage; most individuals had transitioned forward or backward. Changes in ethnic identity were not moderated by disequilibrating life events. 相似文献