首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   91篇
  免费   5篇
  国内免费   1篇
综合类   9篇
建筑科学   1篇
无线电   12篇
一般工业技术   2篇
冶金工业   55篇
自动化技术   18篇
  2013年   2篇
  2012年   3篇
  2011年   4篇
  2010年   6篇
  2009年   7篇
  2008年   7篇
  2007年   7篇
  2006年   3篇
  2005年   3篇
  2004年   5篇
  2003年   7篇
  2002年   5篇
  2001年   3篇
  2000年   3篇
  1999年   1篇
  1998年   2篇
  1997年   1篇
  1996年   3篇
  1987年   1篇
  1985年   1篇
  1983年   2篇
  1972年   1篇
  1967年   1篇
  1965年   1篇
  1964年   3篇
  1962年   1篇
  1960年   4篇
  1959年   6篇
  1958年   4篇
排序方式: 共有97条查询结果,搜索用时 15 毫秒
51.
A strong recent focus on unconscious processes has increased interest in subliminal stimulation and other experimental activation technologies. Five experiments using male and female university students (N = 365) were carried out to compare 5-ms exposures of "mommy and I" stimuli with 5-ms control stimulation. Measures of self-mother similarity and other variables taken 7-14 days after exposure were more strongly correlated among experimental participants. Such complex, persistent effects may follow when powerfully activating stimuli administered under wholly unconscious conditions provokes schematic processing of social information and behavioral confirmation. These scientifically exciting and ethically problematic findings imply a need for further reduction of the role accorded to conscious volition and control in psychology. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
52.
NAEP是对NTRU加密体制的改进,其安全性更高.潜信道是一种在密码协议中建立的秘密信道,而如何能封闭它是一个值得关注的问题.已有在公钥体制中建立潜信道和封闭它的强方法和弱方法,而文中发现可以在NAEP体制中建立这样的潜信道,即封闭该潜信道的方法既不是强方法也不是弱方法,而是介于两者之间的新方法,称为中度方法.  相似文献   
53.
Following a functional perspective on evaluation, the authors hypothesized that subliminal exposure to extreme stimuli (e.g., extremely negative or positive words) would lead these stimuli to be perceived as less extreme. This process--affective habituation--was tested in 4 experiments. In Experiment 1, participants were subliminally exposed to extremely positive and extremely negative words. In a subsequent explicit-judgment task, these words were rated as less extreme than extreme words that had not been presented. In Experiment 2, these results were replicated with an implicit evaluation measure. In Experiments 3 and 4, subliminal exposure to extreme positive and negative words made the words "behave" as words that are only moderately positive or negative. Several implications are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
54.
The author comments that current hysteria related to subliminal advertising may arise from misunderstanding of the scientific issues involved. Rather than protesting against the alleged invasion of the privacy of our homes and minds by the subliminal advertisers, those of us who are concerned with obnoxious advertising on TV might, welcome this occurrence, since it can render obnoxious advertising less effective. Misunderstanding in at least three areas is involved: (1) Sensitivity depends upon stimulus magnitude. (2) Stimuli do not necessarily elicit responses. (3) Experimental reports that people can accurately discriminate or otherwise be affected by stimuli presented so faintly that they report not being conscious of them have been related to the unconscious or subconscious. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
55.
Using the subception hypothesis of Lazarus and McCleary, 2 hypotheses pertaining to the effect upon verbal and autonomic behavior of subliminal visual stimulation were tested. The hypotheses stated that: response latencies and GSRs would be determined by the affective value of the stimuli, and the verbal guesses made during subliminal stimulation would be associations to the stimulus items. 7 Ss were used, and after subliminal presentation of the stimuli, each S was presented with his responses and asked to match them against the stimulus items. The part of the hypothesis pertaining to response latencies was not supported, but the part pertaining to GSRs was confirmed. The second hypothesis, likewise, was confirmed. 18 references. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
56.
"Sixty female undergraduates served as Ss in a study designed to investigate subliminal perception. Speed of stimulus presentation and knowledge of results were varied in a three by two factorial design. No evidence of subliminal perception was obtained. Implications of these findings were discussed." (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
57.
To what extent can subliminal stimulation be used to influence human behavior? This study involving 105 college freshmen attempts to isolate and study a few of the possible variables. "The experimental group saw a classroom movie with the word 'beef' superimposed in flashes of –1??? of a second every seven seconds; the control group just saw the movie. It was found that, compared to the control Ss, the experimental Ss (a) did not show increased verbal references to the stimulus word; (b) did not choose the stimulus object in a multiple choice situation (though sex differences were significant); but (c) did rate themselves significantly more hungry. It was also found that hours of food deprivation did not influence any of these relationships. 15 refs. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
58.
Does subliminal perception really work? 2 groups of Ss enrolled in a sales and advertising class at Purdue University were used as a control group and an experimental group. A film and a questionnaire were used. The chi square technique was used in comparing the experimental and control group data. "If subliminal perception occurred, it did not affect questionnaire responses… . The burden of proof is placed on those who insist that subliminal perception is capable of influencing behavior." (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
59.
潜信道是在公开信道中所建立的一种实现隐蔽通信的信道,潜信道中所传递的潜信息也需要以数字签名的信息形式隐藏起来,研究基于潜信道条件下的新型数字签名算法具有非常重要的意义。文章介绍了有关潜信道方面的基本知识,并对目前研究的潜信道作了分类讨论;然后提出了基于宽带潜信道和窄带潜信道下的新型数字签名算法,对这两种算法从系统初始化、签名生成、签名校验以及潜信道密文信息恢复四个阶段进行详细阐述;从理论上分析了这两种算法的安全性。理论验征表明:文章中提出的新型数字签名算法的安全性基于计算离散对数的困难性,具有较强的安全性和理论研究意义。  相似文献   
60.
分析了现有潜信道方案秘密信息泄漏、签名伪造、匿名身份不可追踪等安全漏洞以及潜信息滥用、协议过程复杂、签名认证运算开销大等不足之处。将门限密码与潜信道相结合,提出了一类基于(t, n)门限密码的匿名潜信道方案,实现了潜消息的门限可验证性与发送者的不可区分性,有效地保护了签名者的隐私信息,必要时又可对匿名身份实施追踪,避免了潜消息恢复权力与发送者匿名性滥用的缺陷,防止了对签名进行联合攻击和广义伪造攻击的安全隐患。方案中协议与算法安全、简洁、高效,降低了软硬件实现的系统开销,可广泛应用于计算机与无线通信等网络环境。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号