首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   398篇
  免费   85篇
  国内免费   23篇
  2023年   7篇
  2022年   8篇
  2021年   19篇
  2020年   33篇
  2019年   34篇
  2018年   35篇
  2017年   22篇
  2016年   36篇
  2015年   15篇
  2014年   25篇
  2013年   65篇
  2012年   11篇
  2011年   28篇
  2010年   18篇
  2009年   25篇
  2008年   15篇
  2007年   9篇
  2006年   8篇
  2005年   11篇
  2004年   5篇
  2003年   8篇
  2002年   3篇
  2001年   7篇
  2000年   3篇
  1999年   2篇
  1998年   7篇
  1997年   1篇
  1996年   4篇
  1995年   2篇
  1994年   4篇
  1993年   6篇
  1992年   2篇
  1991年   2篇
  1990年   1篇
  1989年   1篇
  1988年   2篇
  1987年   2篇
  1986年   1篇
  1985年   2篇
  1984年   3篇
  1983年   2篇
  1982年   2篇
  1981年   2篇
  1980年   1篇
  1979年   4篇
  1976年   2篇
  1975年   1篇
排序方式: 共有506条查询结果,搜索用时 15 毫秒
11.
Information manipulation and cognitive load imposition make the production of deceptive narratives difficult. But little is known about the production of deception, and how its mechanisms may help distinguish truthful from deceitful narratives. This study focuses on the measurement of keystroke dynamics while typing truthful and deceptive eyewitness testimonies after a baseline assessment. While typing their narrative, some participants would undergo an auditory cognitive load. Results show that liars typed their story slower, and in less time than the truthful participants when compared to their respective baselines. The imposition of the auditory cognitive load showed adverse results, enhancing the amount of keystrokes and the time necessary to type the narrative. Classification shows better results for deceptive narrative when no auditory cognitive load is imposed. These results are discussed in terms of expanding current models to include the cognition of linguistic production and writing strategies.  相似文献   
12.
The putative confession (PC) instructions (“[suspect] told me everything that happened and wants you to tell the truth”) increases children's honesty. However, research has shown that children who maintain secrecy despite the PC are more convincing. We examined whether (a) the PC undermines adults' deception detection abilities or (b) children who conceal despite the PC are better deceivers. Adults evaluated truthful and deceptive children interviewed with the PC where the PC portion of the interview was either present or absent. Adults' deception detection was no worse when the PC was present; in fact, it was slightly better. Rather than negatively affecting adults' ability to detect deception, the PC selects an unusually convincing group of concealers.  相似文献   
13.
Traffic congestion and crash rates can be reduced by introducing variable speed limits (VSLs) and automatic incident detection (AID) systems. Previous findings based on loop detector measurements have revealed that drivers reduce their speeds while approaching traffic congestion when the AID system is active. Notwithstanding these behavioural effects, most microscopic traffic flow models assessing the impact of VSLs do not describe driver response accurately.This study analyses the main factors that influence driver deceleration behaviour while approaching traffic congestion with and without VSLs. The Dutch VSL database was linked to the driver behaviour data collected in the UDRIVE naturalistic driving study. Driver engagement in secondary tasks and glance behaviour were extracted from the video data. Linear mixed-effects models predicting the characteristics of deceleration events were estimated.The results show that the maximum deceleration is high when approaching a slower leader, when driving at high speeds and short distance headways, and close to the beginning of traffic congestion. The minimum time headway is short when driving at high speeds and changing lanes. Certain drivers showed higher decelerations and shorter time headways than others. Controlled for these main factors, smaller maximum decelerations were found when the VSLs were present and visible, and when the gantries were within close proximity. These factors could be incorporated into microscopic traffic simulations to evaluate the impact of AID systems on traffic congestion more realistically. Further research is needed to clarify the link between engagement in secondary tasks, glance behaviour and deceleration behaviour.  相似文献   
14.
Intrusion Detection Systems (IDSs) is a system that monitors network traffic for suspicious activity and issues alert when such activity is revealed. Moreover, the existing IDSs-based methods are based on outdated attacks that unable to identify modern attacks or malicious trends. For this reason, in this study we developed a new multi-swarm adaptive grasshopper optimization algorithm to utilize adaptation mechanism in a group of swarms based on fuzzy logic to protect against sophisticated attacks. The proposed (MSAGOA) technique has the capability of global optimization and rapid convergence that are used to attain optimal feature subsets to identify attack types on IDS datasets. In the MSAGOA technique, learning engine as Extreme learning Machine, Naive Bayes, Random Forest and Decision Tree is applied as a fitness function to select the highly discriminating features and to maximize classification performance. Afterward, select the best classifier which works as a fitness function in our approach to measure the performance in terms of accuracy, detection rate, and false alarm rate. The simulations are performed on three IDS datasets such as NSL-KDD, AWID-ATK-R, and NGIDS-DS. The experimental results demonstrated that MSAGOA method has performed better and obtained high detection rate of 99.86%, accuracy of 99.89% in NSL-KDD and high detection rate of 98.73%, accuracy of 99.67% in AWID-ATK-R and detection rate of 89.50%, accuracy of 90.23% in NGIDS-DS. In addition, the performance is compared with several other existing techniques to show the efficacy of the proposed approach.  相似文献   
15.
社会心理学将阴谋论视作一种意识形态上的信念,并定义为人们将重大的政治或社会事件归因为有权力的群体或个人暗中预谋以达成其目的的解释倾向。社会认知视角为个体这种阴谋论信念的产生提供了三种解释。错觉模式感知导致人们认知上倾向于在不相关的事件之间建立联系;敏感性动因觉察影响人们过度感知并假定事件背后的动因、目的和意图等;投射是将自己愿意参与阴谋的意图归因于事件中的他人。  相似文献   
16.
17.
Errors in choice tasks are not only detected fast and reliably, participants often report that they knew that an error occurred already before a response was produced. These early error sensations stand in contrast with evidence suggesting that the earliest neural correlates of error awareness emerge around 300 ms after erroneous responses. The present study aimed to investigate whether anecdotal evidence for early error sensations can be corroborated in a controlled study in which participants provide metacognitive judgments on the subjective timing of error awareness. In Experiment 1, participants had to report whether they became aware of their errors before or after the response. In Experiment 2, we measured confidence in these metacognitive judgments. Our data show that participants report early error sensations with high confidence in the majority of error trials across paradigms and experiments. These results provide first evidence for early error sensations, informing theories of error awareness.  相似文献   
18.
Artificial intelligent systems often model the solutions of typical machine learning problems, inspired by biological processes, because of the biological system is faster and much adaptive than deep learning. The utility of bio-inspired learning methods lie in its ability to discover unknown patterns, and its less dependence on mathematical modeling or exhaustive training. In this paper, we propose a new bio-inspired learning model for a single-class classifier to detect abnormality in video object trajectories. The method uses a simple but dynamic extreme learning machine (ELM) and hierarchical temporal memory (HTM) together referred to as ELM-HTM in an unsupervised way to learn and classify time series patterns. The method has been tested on trajectory sequences in traffic surveillance to find abnormal behaviors such as high-speed, unusual stops, driving in wrong directions, loitering, etc. Experiments have also been performed with 3D air signatures captured using sensors and used for biometric authentication(forged/genuine). The results indicate a significant gain over training time and classification accuracy. The proposed method outperforms in predicting long-time patterns by observing small steps with an average accuracy gain of 15% as compared to the state-of-the-art HTM. The method has applications in detecting abnormal activities in videos by learning the movement patterns as well as in biometric authentication.  相似文献   
19.
近期发现,采用目标探测任务作为二级任务时,目标探测条件不仅不会削弱,甚至会提高记忆成绩,产生注意促进效应(ABE)。为进一步探究目标探测的作用机制,研究采用事件相关电位(ERP)技术,对比目标与分心条件在编码和提取过程中所诱发的ERP差异。结果表明,两类条件在再认过程中所诱发的ERP差异不仅表现在早期与知觉加工相关的ERP成份上,并且一直持续到了后期与细节提取相关的ERP成分上。由此推测,ABE不仅体现在编码早期的知觉加工阶段,更会延续到后期的复述与精加工。  相似文献   
20.
变化盲视是指在某些条件下人们往往觉察不到视觉场景中实质性的改变。最近研究表明,变化盲视发生时个体虽然不能有意识地报告变化,但却能无意识地对变化刺激进行加工和反应,也就是产生了内隐觉察。内隐觉察能够引导注意、影响反应速度。与觉察和无觉察相比,内隐觉察的眼动模式具有鲜明的特征。与无变化试次相比,盲视试次可以观察到显著的脑电活动变化以及不同的脑区激活。内隐觉察的研究虽然取得了丰富的成果,但也还存在着一些需要明确和解决的问题,如左侧前额叶在内隐觉察中的作用,以及如何将没有视觉干扰的范式应用到变化觉察的神经活动测量中等。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号