首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1515篇
  免费   58篇
  2020年   21篇
  2019年   32篇
  2018年   27篇
  2017年   40篇
  2016年   26篇
  2015年   28篇
  2014年   25篇
  2013年   229篇
  2012年   62篇
  2011年   54篇
  2010年   42篇
  2009年   43篇
  2008年   65篇
  2007年   51篇
  2006年   44篇
  2005年   39篇
  2004年   43篇
  2003年   41篇
  2002年   45篇
  2001年   24篇
  2000年   29篇
  1999年   24篇
  1998年   15篇
  1997年   12篇
  1996年   12篇
  1995年   14篇
  1994年   14篇
  1993年   15篇
  1992年   17篇
  1991年   13篇
  1990年   12篇
  1989年   13篇
  1988年   16篇
  1987年   13篇
  1986年   15篇
  1984年   18篇
  1983年   12篇
  1982年   13篇
  1981年   17篇
  1980年   16篇
  1979年   18篇
  1978年   13篇
  1977年   18篇
  1976年   11篇
  1975年   11篇
  1974年   14篇
  1973年   16篇
  1972年   11篇
  1969年   12篇
  1966年   13篇
排序方式: 共有1573条查询结果,搜索用时 46 毫秒
1.
2.
3.
(Frankl, Viktor E. The Doctor and the Soul. New York: Knopf, 1955. Pp. 280.) Reviewed by Robert M. Allen.  相似文献   
4.
We investigated the possible influence of common "demand characteristics" on the results on behavioral language laterality tasks. The demand characteristics were (1) whether Ss were or were not recruited for study according to their handedness, and (2) whether a detailed familial sinistrality inquiry was conducted before or after the tasks. Tasks were the Dichotic Consonant Vowel Task (DCVT) and the Bilateral Object Naming Latency Task (BONLT). Results showed no effect of demand characteristics on the BONLT. On the DCVT, however, prior inquiry regarding familial sinistrality was associated with significantly reduced right ear advantages (REAs). Interactions showed that the greatest reduction in REAs occurred in Ss with left-handedness in their families, who were asked about familial sinistrality prior to the tasks, who took the DCVT after the BONLT, and who were also recruited by handedness. Results, though generally reassuring regarding the robustness of the tasks against these sources of bias, raise some cautions for the DCVT.  相似文献   
5.
A computer virus is a program that replicates itself and spreads to computers with the goal of disrupting or destroying normal computer use. In academic computing, viruses represent a serious problem that costs millions of dollars in losses annually and hinders the free exchange of information so critical to education. Viruses operate in incubation, infection, and destroy phases. The nature, mechanisms, and preventive measures for personal-computer viruses are reviewed. Different procedures are recommended to protect research laboratories, instructional laboratories, and software lending libraries. Tradeoffs between providing adequate protection and not having the security become too burdensome are considered.  相似文献   
6.
Enhancements to the Micro Experimental Laboratory (MEL) and the ways in which they facilitate development of psychological experiments are discussed in this paper. New procedures are described for (1) presenting and manipulating pictorial graphics, (2) inputting response box, voice key, joystick, digitized speech, and mouse responses, (3) outputting lights, speech, and tone stimuli, (4) editing and analyzing digitized speech, and (5) implementing multitask processing. Methods for extending the language, developing test batteries, sequencing subjects, and managing and analyzing data are described.  相似文献   
7.
Using bar code technology to automate data collection provides a rapid and reliable alternative to paper-and-pencil tracking or keyboard entry into pocket or laptop computer. An array of bar code symbols is printed on a data menu, with a unique symbol corresponding to each possible observation. Bar code symbols are scanned using hand-held readers, which record the event, log the observation time, and store data for transfer to a personal computer. Advantages of the bar code monitoring system include: (1) ease of use by staff with minimal technical training, (2) reduced data entry errors and increased entry speed, (3) reliable portable operation, and (4) low-cost hardware. While the bar code system described here is used for behavioral monitoring in a residential treatment setting for the developmentally disabled, with minimal modification this system can be adapted for use in a wide variety of research and clinical applications.  相似文献   
8.
Hardyck, Tzeng, and Wang (1978, Brain and Language, 5, 56–71) hypothesized that ample repetition of a small number of stimuli is required in order to obtain VHF differences in tachistoscopic tasks. Four experiments, with varied levels of repetition, were conducted to test this hypothesis. Three experiments utilized the general task of object-picture naming and one utilized a word-naming task. Naming latencies constituted the dependent measure. The results demonstrate that for the object-naming paradigm repetition is required for RVF superiority to emerge. Repetition was found to be unnecessary for RVF superiority in the word-naming paradigm, with repetition actually reducing RVF superiority. Experiment I suggested the possibility that RVF superiority developed for the second half of the trials as a function of practice or hemispheric activation, regardless of repetition level. Subsequent experiments, better designed to assess this possibility, clearly refuted it. It was concluded that the effect of repetition depends on the processing requirements of the task. We propose that, for tasks which can be processed efficiently by one hemisphere, the effect of repetition will be to reduce VHF asymmetries; but tasks requiring substantial processing by both hemispheres will show shifts to RVF superiority as a function of repetition.  相似文献   
9.
This study assessed the construct validity of the Revised Behavior Problem Checklist (RBPC) by measuring attention, autonomie arousal, and personality in 40 behaviorally disordered children aged 7 to 15 years. Conduct Disorder and Socialized Aggression subscales were characterized by high Psychoticism, Impulsivity, and Lie personality scores, by lower heart rate levels, and by more errors on a continuous performance reaction-time task. Conversely, Attention Problems, Anxiety Withdrawal, and Motor Excess were characterized by greater variability in reaction times. Conduct Disorder alone was related to an external locus of control, while only Attention Problems was characterized by low scores on the WISC Freedom from Distraction factor. These differential relationships suggest (a) support for the construct validity of the RBPC, (b) that antisocial behavior and hyperactivity/attention deficits are dissociated disorders, and (c) that hyperactivity/attention deficits may be characterized by fluctuations in the allocation of attentional resources rather than a core structural deficit in attention.  相似文献   
10.
Unidirectional positioning movements with spatiotemporal constraints were examined as a test of impulse-timing theory (Schmidt, 1976; 1980; Wallace, 1981). Movements were examined at the kinematic, kinetic, and neuromuscular levels in three experiments. In the first experiment, displacement was held constant while five different movement times were examined. Both amplitudes and durations of the EMG and the kinetic variables were related to movement time. The results generally support the impulse-timing model. In the second experiment, movements were performed to a target at each of four distances in a constant movement time. EMG and force amplitudes and, unexpectedly, accelerative-force duration were modulated to achieve changes in displacement when movement time was constant. In the third experiment, movement time and displacement were simultaneously varied resulting in four conditions with equal average velocities. The results of this experiment were not as clear and exhibited individual differences. EMG duration did not always vary with changes in movement time. The results of all three experiments could not be adequately accounted for by the impulse-timing model.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号