首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   58篇
  免费   5篇
各国政治   2篇
工人农民   9篇
世界政治   6篇
外交国际关系   3篇
法律   31篇
中国政治   1篇
政治理论   11篇
  2023年   1篇
  2020年   2篇
  2019年   3篇
  2018年   4篇
  2017年   5篇
  2016年   2篇
  2015年   6篇
  2014年   2篇
  2013年   11篇
  2012年   3篇
  2011年   2篇
  2010年   2篇
  2009年   2篇
  2008年   1篇
  2007年   1篇
  2006年   3篇
  2004年   1篇
  2002年   1篇
  2000年   1篇
  1999年   1篇
  1998年   2篇
  1997年   1篇
  1992年   1篇
  1991年   1篇
  1987年   1篇
  1986年   1篇
  1984年   1篇
  1976年   1篇
排序方式: 共有63条查询结果,搜索用时 62 毫秒
51.
This article unveils the policy agenda of the European Central Bank (ECB) Governing Council as found in the speeches that Governing Council Members gave between 1999 and 2018. Using a dynamic topic‐modeling approached based on non‐negative matrix factorization, we demonstrate how the issues discussed by ECB Governing Council members have evolved over time, and how the general punctuation hypothesis (Jones, B. D. & Baumgartner, F. R. (2005). The politics of attention: How government prioritizes problems. University of Chicago Press) sheds light on what drives this process. We find that unlike policy outputs from many other policymaking systems, ECB communications evolve in a proportional manner. We attribute this finding to the information‐processing capacities of the bank. Our findings speak to the literatures on central bank communications, the evolution of policy agendas, and the application of topic models to speech texts.  相似文献   
52.
Abstract

How can we understand the role of secrecy in the making of the European Union’s Common Foreign and Security Policy (CFSP)? This article analyses the nature of secrecy and questions some of the main assumptions surrounding the concept. In this respect, it argues that secrecy may be of functional necessity for policy-makers and actually compatible with good governance. Moreover, we must not put too much stock in transparency alone in that the relationship between secrecy and transparency is not zero-sum ? historically, transparency has sometimes been an instrument of control and domination. The article considers the case of the Common Security and Defence Policy (CSDP) to shed light on what kind of secrecy exists in the foreign policy area, and argues that this is mainly a combination of functional and compound secrecy.  相似文献   
53.
The aim of this study was to add to the emerging knowledge about the role of bystanders in cyberbullying. To differentiate online versus offline bystander behaviors, 292 Australian children (mean age = 15.2; female = 54.4%) reviewed hypothetical scenarios experimentally manipulated by bystander sex, relationship to target and perpetrator, and severity of bullying incident. In both environments, bystander helping behaviors were more likely when the target was a close friend, perceived harm to the target was high, and when bystanders were female. Bystanders also reported being less likely to approach teachers or publicly defend targets in online versus offline environments. This suggests programs designed to encourage positive bystander behaviors online can be similar to face-to-face approaches, but they need to recognize some aspects unique to the online environment.  相似文献   
54.
55.
The loss of a cotter pin in the front wheel assembly of cars and trucks has been a problem for several years. This is shown by the fact that the automobile manufacturers have been committed to a 100% inspection of the process for installing them on cars and trucks. In this paper, three accident cases are presented, along with a method by which the forensic engineer can determine if a cotter pin has ever been installed on the front wheel assembly. Testing was done to show what the spindle would look like if the cotter pin had been installed properly and forcibly removed. Photographs show both the accident and test spindle for comparison.  相似文献   
56.
This research investigated the sexual dimorphism of the first human rib using geometric morphometric and metric approaches on a sample of 285 specimens containing European Americans and African Americans from the Hamann‐Todd collection. Metric measurements were investigated for sexual dimorphism and ancestral differences using univariate statistics. Four type II landmarks and 40 sliding semi‐landmarks were placed outlining the dorsal and ventral curvatures of the ribs. Landmark data were processed using Generalized Procrustes Analyses with Procrustes distance sliding, and the subsequent coordinates were investigated for sexual dimorphism and ancestral differences using Procrustes ANOVAs. Both geometric morphometric and metric data were analyzed using cross‐validated discriminant function analyses to test the hypothesis that variables from both approaches can be combined to increase sex classification rate. European Americans had sex correctly classified as high as 88.05% and African Americans as high as 70.86% using a combination of metric and geometric morphometric variables.  相似文献   
57.
Institutional Review Boards often raise concerns about qualitative research with vulnerable populations such as crime victims, and assume that research with vulnerable populations will be distressing for participants. It is therefore vital to examine whether participants do in fact experience adverse effects stemming from their participation. The existing research is clear that some members of vulnerable populations do feel distressed when they participate in research; however, in most cases, this distress is outweighed by the benefits of participation, such as a sense of having contributed to community awareness raising. This literature is, however, predominantly quantitative. In addition, it overwhelmingly focuses on violent trauma, providing no insight into participants’ experiences of research on non-violent traumatic events. The current study addresses these shortcomings by examining the research participation experiences of victims of online fraud. Specifically, an online questionnaire designed to elicit qualitative data was administered to victims of online fraud who had previously participated in a semi-structured qualitative interview. Among other findings, the study suggests that perceptions about the outcomes of research, in addition to the research process, influence victims’ satisfaction with their participation in qualitative research.  相似文献   
58.
59.
Twenty Sus scrofa carcasses were used to study the effect the presence of clothing had on decomposition rate and colonization locations of Diptera species; 10 unclothed control carcasses were compared to 10 clothed experimental carcasses over 58 days. Data collection occurred at regular accumulated degree day intervals; the level of decomposition as Total Body Score (TBSsurf), pattern of decomposition, and Diptera present was documented. Results indicated a statistically significant difference in the rate of decomposition, (t427 = 2.59, p = 0.010), with unclothed carcasses decomposing faster than clothed carcasses. However, the overall decomposition rates from each carcass group are too similar to separate when applying a 95% CI, which means that, although statistically significant, from a practical forensic point of view they are not sufficiently dissimilar as to warrant the application of different formulae to estimate the postmortem interval. Further results demonstrated clothing provided blow flies with additional colonization locations.  相似文献   
60.
Glass surfaces were modified with a combination of dyes and reagents to allow for the potential simultaneous recording of a detailed fingerprint and the detection of the explosive urea nitrate (UN), as a proof of principle of surface modification for simultaneous linking of identity to manipulation of explosives. By coating microscope slides with 9,10‐diphenylanthracene (DPA), p‐dimethylaminobenzaldehyde (p‐DMAB) and p‐dimethylaminocinnamaldehyde (p‐DMAC), a colorimetric change was observed in the presence of UN, while revealing a fingerprint with enough resolution to isolate at least 10 minutiae. This is the first step in creating point‐of‐care devices capable of detecting low concentrations of explosives and drug metabolites and connecting them to a fingerprint.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号