首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3篇
  免费   2篇
  2016年   1篇
  2015年   1篇
  2013年   1篇
  2004年   1篇
  2000年   1篇
排序方式: 共有5条查询结果,搜索用时 15 毫秒
1
1.
Eight crows were taught to discriminate overlapping pairs of visual stimuli (A+ B-, B+ C-, C+ D-, and D+ E-). For 4 birds, the stimuli were colored cards with a circle of the same color on the reverse side whose diameter decreased from A to E (ordered feedback group). These circles were made available for comparison to potentially help the crows order the stimuli along a physical dimension. For the other 4 birds, the circles corresponding to the colored cards had the same diameter (constant feedback group). In later testing, a novel choice pair (BD) was presented. Reinforcement history involving stimuli B and D was controlled so that the reinforcement/nonreinforcement ratios for the latter would be greater than for the former. If, during the BD test, the crows chose between stimuli according to these reinforcement/nonreinforcement ratios, then they should prefer D; if they chose according to the diameter of the feedback stimuli, then they should prefer B. In the ordered feedback group, the crows strongly preferred B over D; in the constant feedback group, the crows' choice did not differ significantly from chance. These results, plus simulations using associative models, suggest that the orderability of the postchoice feedback stimuli is important for crows' transitive responding.  相似文献   
2.
3.
Researchers have begun to explore the problem of mass data breaches, where consumer information is acquired by cybercriminals and sold in open markets on-line. Although studies document the social processes of the market and relationships between buyers and sellers, few have considered the revenues earned from market transactions. This study explored these issues using a sample of threads from 10 Russian language and 3 English language Web forums used to sell stolen data. Estimates were generated on the total number of transactions completed by participants along with the advertised prices for the two most common forms of personal information sold. The findings demonstrated that buyers may earn a range of revenues from the sale of stolen data, although this figure was smaller than the potential profits earned from fraudulent use and identity crimes by data buyers. The implications of this study for cybercrime research and policy are explored in detail.  相似文献   
4.
Hooded crows were trained in two-alternative simultaneous matching and oddity tasks with stimulus sets of three different categories: color (black and white), shape (Arabic Numerals 1 and 2, which were used as visual shapes only), and number of elements (arrays of one and two items). These three sets were used for training successively and repeatedly; the stimulus set was changed to the next one after the criterion (80% correct or better over 30 consecutive trials) was reached with the previous one. Training was continued until the criterion could be reached within the first 30 to 50 trials for each of the three training sets. During partial transfer tests, familiar stimuli (numerals and arrays in the range from 1 to 2) were paired with novel ones (numerals and arrays in the range from 3 to 4). At the final stage of testing only novel stimuli were presented (numerals and arrays in the range from 5 to 8). Four of 6 birds were able to transfer in these tests, and their performance was significantly above chance. Moreover, performance of the birds on the array stimuli did not differ from their performance on the color or shape stimuli. They were capable of recognizing the number of elements in arrays and comparing the stimuli by this attribute. It was concluded that crows were able to apply the matching (or oddity) concept to stimuli of numerical category.  相似文献   
5.
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号