首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10602篇
  免费   402篇
各国政治   756篇
工人农民   465篇
世界政治   903篇
外交国际关系   485篇
法律   6034篇
中国共产党   2篇
中国政治   140篇
政治理论   2128篇
综合类   91篇
  2023年   57篇
  2021年   68篇
  2020年   178篇
  2019年   204篇
  2018年   291篇
  2017年   316篇
  2016年   320篇
  2015年   252篇
  2014年   287篇
  2013年   1350篇
  2012年   305篇
  2011年   369篇
  2010年   256篇
  2009年   279篇
  2008年   300篇
  2007年   275篇
  2006年   276篇
  2005年   241篇
  2004年   270篇
  2003年   280篇
  2002年   196篇
  2001年   394篇
  2000年   367篇
  1999年   307篇
  1998年   158篇
  1997年   118篇
  1996年   116篇
  1995年   109篇
  1994年   117篇
  1993年   112篇
  1992年   168篇
  1991年   165篇
  1990年   151篇
  1989年   141篇
  1988年   166篇
  1987年   162篇
  1986年   163篇
  1985年   150篇
  1984年   148篇
  1983年   158篇
  1982年   97篇
  1981年   68篇
  1980年   84篇
  1979年   104篇
  1978年   83篇
  1977年   68篇
  1976年   69篇
  1975年   59篇
  1972年   56篇
  1971年   62篇
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
1.
2.
ABSTRACT

Since the late 20th century, the federal government has regulated colleges’ and universities’ handling of campus sexual and gender-based violence (CSGBV). Although the arc of history has bent toward establishing greater protections for victims of such violence, new proposed regulation by the U.S. Department of Education under the Trump administration focuses more heavily on ensuring due process rights for students accused of CSGBV. Most recently, in November 2018, U.S. Secretary of Education, Betsy DeVos submitted a proposed rule change to the regulation of Title IX of the Education Amendments of 1972. This article provides the historical context for this most recent proposed federal regulation of CSGBV and discusses the criticism of this proposal that, if it is implemented, students would become less safe in the ivory tower.  相似文献   
3.
This article argues that Donald Trump’s Asian strategy hardly marks a radical transformation from Barack Obama’s ‘pivot to Asia’. This is because the ‘pivot to Asia’ never really existed. Although Obama was successful in building legitimacy for the strategy through international norms, he failed to translate his lofty rhetoric into practice. Much of his original pivot components (building a constructive relationship with China, coordinating with Asian allies and multilateralism in the Association of South East Asian Nations and the Trans-Pacific Partnership) has either failed or did not live up to expectations. Donald Trump was adamant that the Asian pivot was a bad strategy and that he would not follow it. But although he completely discarded Obama’s legitimization of the rebalance (as Trump speaks pragmatically and does not care about international norms), in actuality he has followed many of Obama’s policies, and even improved on some of them. That being said, Trump’s ‘pivot actions’ appear to be erratic, pragmatic short-term actions rather than a meticulously planned long-term strategy similar to Obama’s rebalance (which did not materialize). Thus, while Obama failed to transform the pivot into an effective strategy, neither is Trump’s effectiveness backed by a coherent Asian strategy.  相似文献   
4.
Abstract

This article reports and discusses the results of a study that investigated photographic images of children in five online terrorist magazines to understand the roles of children in these groups. The analysis encompasses issues of Inspire, Dabiq, Jihad Recollections (JR), Azan, and Gaidi Mtanni (GM) from 2009 to 2016. The total number of images was ninety-four. A news value framework was applied that systematically investigated what values the images held that resulted in them being “newsworthy” enough to be published. This article discusses the key findings, which were that Dabiq distinguished different roles for boys and girls, portrayed fierce and prestigious boy child perpetrators, and children flourishing under the caliphate; Inspire and Azan focused on portraying children as victims of Western-backed warfare; GM portrayed children supporting the cause peacefully; and JR contained no re-occurring findings.  相似文献   
5.
Minutiae are small distinguishing features found along every ridge flow, which make each friction ridge print unique. The most common friction ridge prints found at the crime scene are fingerprints; therefore, the most of the minutiae studies are focused exactly on this kind of prints. The authors believe that further examination and enlargement of the palm print database could result in better use of the palm prints for personal identification. We analyzed a total of 160 palm prints from 40 females and 40 males aged between 18 and 70 years from Slovakia. For the evaluation of the minutiae, the area of the hypothenar had to be marked out. The classification of the minutiae used for this study was based on a modified version of the classification system using the total of 13 types of minutiae. The frequency of every minutiae type was calculated and, using the chi-square test with Yates's correction, bilateral and sex differences were assessed. The relationship between the different types of minutiae was examined with Pearson's correlation test. During the initial phases of the identification process, the focus should be on the least common types of minutiae (Y or M and return), which were found not to correlate; thus, their mutual occurrence is random (e.g., overlap—Y or M, crossbar—return, or Y or M—dock). The results of the present study show which specific minutiae types are the most suitable for personal identification. These findings may be beneficial in more effective outcome of the identification process.  相似文献   
6.
Governments are increasingly implementing smart and digital approaches to promoting citizen participation. However, whether online participation platforms are tools that improve inclusivity in citizen participation remains underexplored. To address this gap, this article focuses on the role of recruitment messages and their effect on participation in an online participation platform by gender and age. A field experiment with a neighborhood census sample (N = 6,066) shows that online participation dips for younger and older citizens and is equal among women and men. For the age groups between 60 and 75, differences in the control and intervention recruitment messages significantly impacted participation. These findings can help public managers tailor recruitment strategies to facilitate inclusive participation and represent a first step toward learning what types of messages are effective for whom.  相似文献   
7.
Journal of Youth and Adolescence - Chronotype, or morningness/eveningness, has been associated with adjustment in both children and adolescents. Specifically, eveningness has been linked to...  相似文献   
8.
In response to research demonstrating that irrelevant contextual information can bias forensic science analyses, authorities have increasingly urged laboratories to limit analysts' access to irrelevant and potentially biasing information (Dror and Cole (2010) [3]; National Academy of Sciences (2009) [18]; President's Council of Advisors on Science and Technology (2016) [22]; UK Forensic Science Regulator (2015) [26]). However, a great challenge in implementing this reform is determining which information is task-relevant and which is task-irrelevant. In the current study, we surveyed 183 forensic analysts to examine what they consider relevant versus irrelevant in their forensic analyses. Results revealed that analysts generally do not regard information regarding the suspect or victim as essential to their analytic tasks. However, there was significant variability among analysts within and between disciplines. Findings suggest that forensic science disciplines need to agree on what they regard as task-relevant before context management procedures can be properly implemented. The lack of consensus about what is relevant information not only leaves room for biasing information, but also reveals foundational gaps in what analysts consider crucial in forensic decision making.  相似文献   
9.
Abstract

Despite shared historical experience and cultural proximity, the Visegrad group (V4) struggles to institutionalise its cooperation through stable mechanisms ensuring internal cohesion and external credibility. This is especially evident in the field of security and defence, which requires a shared strategic vision, in particular, common norms regarding the legitimate use of military force. While in the 1990s the four countries exhibited solidarity and unity in their collective ambition under the narrative of the ‘Return to Europe’, their general perception of security threats and strategic culture prevents deeper integration into a security community.  相似文献   
10.

Identity and academic motivation are particularly at stake before the major transition to higher education. However, few studies have explored their changes and their longitudinal bidirectional links. To fill this gap, a three-wave study from the end of the 11th grade to the end of the 12th grade was conducted to explore changes in identity processes and academic motivation and to investigate how they might be interconnected over time. 599 adolescents (mean age 17.4; 59% girls) completed questionnaires containing measures about identity processes and three types of academic motivation: autonomous, controlled, and impersonal. Throughout the study span of one year, four identity processes increased: commitment making, identification with commitment, exploration in breadth and exploration in depth, while the process of ruminative exploration decreased. Simultaneously, late adolescents encountered an increase in impersonal motivation, more salient for boys. The results also revealed unidirectional links from motivation to identity processes, with no gender or age moderator effects: exploration in breadth and exploration in depth were positively predicted by autonomous motivation, ruminative exploration was positively predicted by autonomous, controlled, and impersonal motivation. In addition, impersonal motivation negatively predicted commitment making. On the other hand, identification with commitment positively predicted autonomous motivation. Practical implications are discussed.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号