首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   162篇
  免费   9篇
各国政治   3篇
工人农民   1篇
世界政治   2篇
外交国际关系   3篇
法律   88篇
中国共产党   1篇
中国政治   28篇
政治理论   11篇
综合类   34篇
  2023年   2篇
  2022年   1篇
  2021年   3篇
  2020年   5篇
  2019年   3篇
  2018年   4篇
  2017年   4篇
  2016年   14篇
  2015年   5篇
  2014年   10篇
  2013年   21篇
  2012年   8篇
  2011年   10篇
  2010年   4篇
  2009年   10篇
  2008年   8篇
  2007年   13篇
  2006年   7篇
  2005年   9篇
  2004年   8篇
  2003年   5篇
  2002年   4篇
  2001年   9篇
  2000年   2篇
  1994年   1篇
  1993年   1篇
排序方式: 共有171条查询结果,搜索用时 31 毫秒
21.
近年来,服刑人员的教育改造工作越来越受到重视,但是在教育内容上仍存在“大而全”的弊病。为提高教育改造质量,树立职业技术教育在狱内的主导地位,开展专业化、社会化的办学模式,有利于提高服刑人员回归社会的生存能力,也有助于其适应社会、立足社会。  相似文献   
22.
To prevent image forgeries, a number of forensic techniques for digital image have been developed that can detect an image's origin, trace its processing history, and can also locate the position of tampering. Especially, the statistical footprint left by JPEG compression operation can be a valuable source of information for the forensic analyst, and some image forensic algorithm have been raised based on the image statistics in the DCT domain. Recently, it has been shown that footprints can be removed by adding a suitable anti‐forensic dithering signal to the image in the DCT domain, this results in invalid for some image forensic algorithms. In this paper, a novel anti‐forensic algorithm is proposed, which is capable of concealing the quantization artifacts that left in the single JPEG compressed image. In the scheme, a chaos‐based dither is added to an image's DCT coefficients to remove such artifacts. Effectiveness of both the scheme and the loss of image quality are evaluated through the experiments. The simulation results show that the proposed anti‐forensic scheme can verify the reliability of the JPEG forensic tools.  相似文献   
23.
In this paper, a new nonmetric method called POSAC is presented and illustrated through an analysis of the crime patterns of all the states in the United States. POSAC is a graphical technique for the display of multivariate data in a two-dimensional space. It maps the rows (e.g., states) of a matrix in a way that maximizes the preservation of theirpartial order, with similar states located in close proximity on the map. POSAC is based on the partial order among observations rather than their actual magnitude. POSAC seems to bear the same relationship to the principal-component analysis (PCA) as that borne by the median to the arithmetic mean. As a matter of fact, POSAC is a form of ordinal factor analysis. Its advantage over PCA is its robustness to the data. The technique enables observations and variables to be studied simultaneously. Seven index crime categories are analyzed. In order to demonstrate the utility of POSAC in detecting changes in crime patterns over time, we included in our analysis three selected years: 1944, 1965, and 1987. The results for the year 1987 are compared to those obtained by PCA.  相似文献   
24.
Vertebral artery removing constitutes a significant forensic pathology challenge. Dissection techniques during head-neck autopsy are based on anterior approach, a difficult method, which is unable to assess the transverse part of the artery. This work presents an original and simple method for dissecting vertebral arteries by a posterior approach, opening the vertebroarterial canal through the spinal canal without any special equipment. Once the spinal cord is removed, the transversarium foramens are opened by an internal cut at the pedicle and an external cut at the transverse process. This enables us to visualize vertebral arteries in its entirety. The method improves both the examination of the upper extracranial segment of the vertebral artery and the neuropathological study when arterial injury is suspected. Applying this method routinely is both feasible and useful in suspected cases of vertebral artery trauma and could contribute to assess more precisely the actual incidence of this injury.  相似文献   
25.
Restoration of autopsy incisions can result in inadvertent needle stick injury to the prosector, which can be difficult to prevent even with the use of personal protective equipment such as Kevlar cut resistant gloves. We present a new technique for closure of autopsy incisions using a commonly available commercial hardware tool, a hole punch with a lever enhanced action, combined with blunt probe sewing, which results in an esthetic and leak‐proof means of restoring cadavers. This technique is especially useful in cases which may pose blood‐borne infection risks to the prosector.  相似文献   
26.
《Digital Investigation》2014,11(2):120-140
In this paper, we present a passive approach for effective detection and localization of region-level forgery from video sequences possibly with camera motion. As most digital image/video capture devices do not have modules for embedding watermark or signature, passive forgery detection which aims to detect the traces of tampering without embedded information has become the major focus of recent research. However, most of current passive approaches either work only for frame-level detection and cannot localize region-level forgery, or suffer from high false detection rates for localization of tampered regions. In this paper, we investigate two common region-level inpainting methods for object removal, temporal copy-and-paste and exemplar-based texture synthesis, and propose a new approach based on spatio-temporal coherence analysis for detection and localization of tampered regions. Our approach can handle camera motion and multiple object removal. Experiments show that our approach outperforms previous approaches, and can effectively detect and localize regions tampered by temporal copy-and-paste and texture synthesis.  相似文献   
27.
《Science & justice》2022,62(4):433-447
The forensic scenario, on which the round robin study was based, simulated a suspected intentional manipulation of a real estate rental agreement consisting of a total of three pages. The aims of this study were to (i) establish the amount and reliability of information extractable from a single type of evidence and to (ii) provide suggestions on the most suitable combination of compatible techniques for a multi-modal imaging approach to forgery detection. To address these aims, seventeen laboratories from sixteen countries were invited to answer the following tasks questions: (i) which printing technique was used? (ii) were the three pages printed with the same printer? (iii) were the three pages made from the same paper? (iv) were the three pages originally stapled? (v) were the headings and signatures written with the same ink? and (vi) were headings and signatures of the same age on all pages? The methods used were classified into the following categories: Optical spectroscopy, including multispectral imaging, smartphone mapping, UV-luminescence and LIBS; Infrared spectroscopy, including Raman and FTIR (micro-)spectroscopy; X-ray spectroscopy, including SEM-EDX, PIXE and XPS; Mass spectrometry, including ICPMS, SIMS, MALDI and LDIMS; Electrostatic imaging, as well as non-imaging methods, such as non-multimodal visual inspection, (micro-)spectroscopy, physical testing and thin layer chromatography. The performance of the techniques was evaluated as the proportion of discriminated sample pairs to all possible sample pairs. For the undiscriminated sample pairs, a distinction was made between undecidability and false positive claims. It was found that none of the methods used were able to solve all tasks completely and/or correctly and that certain methods were a priori judged unsuitable by the laboratories for some tasks. Correct results were generally achieved for the discrimination of printer toners, whereas incorrect results in the discrimination of inks. For the discrimination of paper, solid state analytical methods proved to be superior to mass spectrometric methods. None of the participating laboratories deemed addressing ink age feasible. It was concluded that correct forensic statements can only be achieved by the complementary application of different methods and that the classical approach of round robin studies to send standardised subsamples to the participants is not feasible for a true multimodal approach if the techniques are not available at one location.  相似文献   
28.
Digital video is used in criminal trials as evidence with legal responsibility because video content vividly depicts events occurring at a crime scene. However, using sophisticated video editing software, assailants can easily manipulate visible clues for their own benefit. Therefore, the integrity of digital video files acquired or submitted as evidence must be ensured. Forensic analysis of digital video is key to ensuring the integrity of links with individual cameras. In this study, we analyzed whether it is possible to ensure the integrity of MTS video files. Herein, we propose a method to verify the integrity of MTS files encoded by advanced video coding high definition (AVCHD), which is frequently used for video recording. To verify MTS file integrity, we propose five features. Codec information, picture timing, and camera manufacture/model are modified AVI and MP4-like format video verification features. Group of pictures and Universally Unique Identifier patterns were specifically developed for MTS streams. We analyzed the features of 44 standard files recorded using all recording options of seven cameras. We checked whether integrity can be validated on unmanipulated videos recorded in various environments. In addition, we considered whether manipulated MTS files edited in video editing software could be validated. Experimental results show that all unmanipulated and manipulated MTS files with known recording devices were discriminated only when all five features were checked. These results show that the proposed method verifies the integrity of MTS files, strengthening the validity of MTS file-based evidence in trials.  相似文献   
29.
Due to present of enormous free image and video editing software on the Internet, tampering of digital images and videos have become very easy. Validating the integrity of images or videos and detecting any attempt of forgery without use of active forensic technique such as Digital Signature or Digital Watermark is a big challenge to researchers. Passive forensic techniques, unlike active techniques, do not need any preembeded information about the image or video. The proposed paper presents a comprehensive review of the recent developments in the field of digital image and video forensic using noise features. The previously existing methods of image and video forensics proved the importance of noises and encourage us for the study and perform extensive research in this field. Moreover, in this paper, forensic task cover mainly source identification and forgery detection in the image and video using noise features. Thus, various source identification and forgery detection methods using noise features are reviewed and compared in this paper for image and video. The overall objective of this paper is to give researchers a broad perspective on various aspects of image and video forensics using noise features. Conclusion part of this paper discusses about the importance of noise features and the challenges encountered by different image and video forensic method using noise features.  相似文献   
30.
基层法官司法知识的开示   总被引:7,自引:0,他引:7  
苏力 《现代法学》2000,22(3):9-13
基于时中国基层司法的调查和研究,本文试图概括地总结中国基层司法中经常运用的一些在现有的法律知识体制中末于以足够重视的知识和技术,并予以初步的理论分析。本文认为,由于中国基层法院法官所处的特定制度空间(初审法院)和时空位置(中国基层社会),他/她们所需要的知识和技巧不仅与理想型法官不同,而且与上诉审法官也不同。在这种余件下,中国基层法院法官实际上经常并非自党地创造和运用一些知识和技术。这种知识和技术有助于实用主义地解决一些实际问题,并且从现代的其他学科知识看来也具有一定的学理上的正当性,但是在有些情况下,也有可能被滥用。这种从司法实践来的知识,尽管来自基层,缺乏实践者的自我反思,但仍然具有实践意义和理论意义,需要当代中国关注现实的法学象的重视和研究。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号