首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   61篇
  免费   0篇
各国政治   6篇
世界政治   2篇
外交国际关系   3篇
法律   21篇
中国政治   5篇
政治理论   2篇
综合类   22篇
  2022年   1篇
  2021年   1篇
  2020年   2篇
  2019年   1篇
  2017年   1篇
  2016年   1篇
  2015年   5篇
  2014年   7篇
  2013年   8篇
  2012年   4篇
  2011年   5篇
  2010年   3篇
  2009年   2篇
  2008年   4篇
  2007年   4篇
  2006年   4篇
  2005年   3篇
  2004年   1篇
  2003年   3篇
  2001年   1篇
排序方式: 共有61条查询结果,搜索用时 578 毫秒
1.
城市重大体育事件是指以租用、借用或者以其他形式临时占用公共场所,面向社会公众举办,单次参加人员在10000人以上的群体性活动,包括体育比赛、体育展览展销以及含有竞技色彩的民俗活动等。在重大体育事件过程中,突发性公共安全危害可分为群体械斗事件、拥挤践踏事故两类。重大体育事件对地方发展具有的重要意义已成为我国各地政府的共识,但随着规模扩大和场次的增加,其安全保卫难度也随之提高。对重大体育事件安全保障战略和路径设计是:形成以政府为主导,以企业、非营利性组织为联盟的安全保障主体;构建灵活有效的危机安全防范体系;加强公众安全防范教育;注意体育场馆、公共场所的细节设计。  相似文献   
2.
陈柏峰 《法学家》2012,(1):27-41,176
"宜黄事件"是一起因传媒监督而具有法律意义的典型事件。对该起事件的调研及对相关新闻内容的梳理表明,其传媒监督权行使的信息基础存在瑕疵,有违新闻报道的基本要求;相关传媒也未能坚持中立的立场,报导中未能做到尽可能的客观公正,未能兼顾冲突双方的话语权。因此,该案传媒监督权的行使出现了法治偏差。这与传媒介入的特性有关,更与传媒追求商业利益的倾向有关。社会和公共领域中的政治力量,也可能影响传媒监督权的立场。承担公共表达职能的传媒,是现代法治国家共同价值的维系纽带之一,因此需要平衡商业利益和政治力量的制约,塑造传媒监督的健康立场。这可以通过职业伦理约束和法律规范的共同作用来实现。  相似文献   
3.
目的分析稳态条件(例如,无制动)下国内车辆EDR碰前车速的可信度,为EDR碰前车速的应用提供参考。方法在国外研究结论的基础上,选取国内1起既有EDR数据又有监控视频的实际案例,利用监控视频计算所得车速为参考值,分析事故车辆稳态行驶时EDR车速的可信度,并结合EDR车速的来源对其进一步分析。结果根据国外文献研究结果可知,车辆稳态行驶时EDR车速的相对误差在±4%以内。通过国内1起实例的分析,显示稳态行驶车速为120 km/h,EDR记录的碰前车速相对误差为3.886%。结论结合EDR车速来源的分析表明,稳态条件下,国内车辆EDR记录的碰前车速同样具有很好的可信度,可有效应用到相关的车速重建中。  相似文献   
4.
《Communist and Post》2014,47(2):147-158
In this research I propose that the concept of diversionary theory provides at least a partial explanation for North Korea's conflict activities. I examine and analyze the country's data on diplomatic and military activities from 1997 to 2011 and argue that North Korea's domestic conditions influence its willingness to engage in external conflict. I also examine the impact of such external influences as UN sanctions, leadership changes in the region, national capacities of the US, South Korea and Japan, and strategic military exercises on DPRK-initiated conflicts. This study provides insight into the activities of this reclusive state and also demonstrates useful techniques that can be applied to analyze other similarly closed nations. The findings suggest that there are identified links between internal conditions and the Kim regime's aggressive actions between 1997 and 2011 in support of the diversionary argument. Concurrently, there is less evidence that North Korea's hostile diplomatic and military activities are based on external pressures.  相似文献   
5.
1991年 3月17日全苏公投仍有高达 76%民众支持保留共同国家.但不到 9 个月之后,别洛韦日森林声明即宣布苏联终止存在.假如在公投举行以后,不是采取建立主权国家联盟的方针,而是循序渐进地建立一个"软"联邦,一开始仅限于建议签订建立共同经济空间的协议,分离主义者的目的就不会达到."8·19"事件更多是起了雷管的作用.先前的发展方式挖了苏联的墙角.导致苏联垮台的深层次经济原因体现在行政管理体系的结构性危机上.而由国家结构中长期缺乏联邦制引发的中央与各加盟共和国关系的危机,是苏联解体的另一个最重要的原因.保留苏共作为确保苏联统一的机制,其必要条件是党本身的民主化.制约苏共民主化的主要力量是党的机关,它实际上处于选举出来的党的机构之上.在帮助苏联走出经济困境方面,西方甚至"连手指头都没有动一下".而困难至极的经济形势在很大程度上注定了苏联的解体.  相似文献   
6.
基于事项法产生的会计信息系统是新经济形势下的产物,已呈现出明显的优越性。但事项法会计信息披露在应用中存在与传统会计环境不协调之处,技术处理上有应用困难且成本太高,企业竞争对手之间也存在博弈问题。针对以上应用现状,提出相应对策修正其缺陷,弥补其不足,使之具有更强的可操作性。  相似文献   
7.
《Digital Investigation》2014,11(3):224-233
The allocation algorithm of the Linux FAT32 file system driver positions files on disk in such a way that their relative positions reveal information on the order in which these files have been created. This provides an opportunity to enrich information from (carved) file fragments with time information, even when such file fragments lack the file system metadata in which time-related information is usually to be found.Through source code analysis and experiments the behaviour of the Linux FAT allocator is examined. How an understanding of this allocator can be applied in practice is demonstrated with a case study involving a TomTom GPS car navigation device. In this case, time information played a crucial role. Large amounts of location records could be carved from this device's flash storage, yielding insight into the locations the device has visited—yet the carved records themselves offered no information on when the device had been at the locations. Still, bounds on the records' time of creation could be inferred when making use of filesystem timestamps related to neighbouring on-disk positions.Finally, we perform experiments which contrast the Linux behaviour with that of Windows 7. We show that the latter differs subtly, breaking the strong relation between creation order and position.  相似文献   
8.
Attacks on operating system access control have become a significant and increasingly common problem. This type of security threat is recorded in a forensic artifact such as an authentication log. Forensic investigators will generally examine the log to analyze such incidents. An anomaly is highly correlated to an attacker's attempts to compromise the system. In this paper, we propose a novel method to automatically detect an anomaly in the access control log of an operating system. The logs will be first preprocessed and then clustered using an improved MajorClust algorithm to get a better cluster. This technique provides parameter-free clustering so that it automatically can produce an analysis report for the forensic investigators. The clustering results will be checked for anomalies based on a score that considers some factors such as the total members in a cluster, the frequency of the events in the log file, and the inter-arrival time of a specific activity. We also provide a graph-based visualization of logs to assist the investigators with easy analysis. Experimental results compiled on an open dataset of a Linux authentication log show that the proposed method achieved the accuracy of 83.14% in the authentication log dataset.  相似文献   
9.
After viewing a crime video, participants answered 16 answerable and 6 unanswerable questions. Those in the "voluntary guess" condition had a "don't know" response option; those in the "forced guess" condition did not. One week later the same questions were answered with a "don't know" option. In both experiments, information generated from forced confabulation was less likely remembered than information voluntarily self-generated. Further, when the same answer was given to an unanswerable question both times, the confidence expressed in the answer increased over time in both the forced and the voluntary guess conditions. Pressing eyewitnesses to answer questions, especially questions repeated thrice (Experiment 2), may not be an effective practice because it reliably increases intrusion errors but not correct recall.  相似文献   
10.
防暴战术队形训练体系模式的构建,应遵循认识规律,借鉴管理学的模块化组织理念,并立足公安实际.可按职能组划分实施分组训练,按作战单元划分实施层级合成训练,按训练体系实施侧重训练.着重从实战出发,突出防暴战术队形“动”“静”相辅,谋求“战训合一”.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号