首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   826篇
  免费   36篇
各国政治   37篇
工人农民   92篇
世界政治   73篇
外交国际关系   119篇
法律   377篇
中国政治   5篇
政治理论   152篇
综合类   7篇
  2023年   7篇
  2020年   13篇
  2019年   19篇
  2018年   25篇
  2017年   21篇
  2016年   27篇
  2015年   15篇
  2014年   14篇
  2013年   124篇
  2012年   21篇
  2011年   31篇
  2010年   22篇
  2009年   23篇
  2008年   38篇
  2007年   54篇
  2006年   46篇
  2005年   35篇
  2004年   33篇
  2003年   22篇
  2002年   29篇
  2001年   13篇
  2000年   20篇
  1999年   12篇
  1998年   12篇
  1997年   10篇
  1996年   12篇
  1995年   9篇
  1994年   11篇
  1993年   14篇
  1992年   14篇
  1991年   6篇
  1990年   11篇
  1989年   6篇
  1988年   8篇
  1987年   6篇
  1986年   4篇
  1985年   8篇
  1984年   5篇
  1983年   6篇
  1982年   5篇
  1981年   10篇
  1980年   4篇
  1979年   8篇
  1978年   5篇
  1977年   3篇
  1976年   2篇
  1975年   2篇
  1974年   2篇
  1973年   6篇
  1971年   2篇
排序方式: 共有862条查询结果,搜索用时 31 毫秒
701.
702.
Kotz D 《U.S. news & world report》2007,143(8):60-2, 65-6, 68-9
  相似文献   
703.
704.
705.
Developmental taxonomies of crime disagree on whether distinctive offender trajectories are related to common or unique risks. This study examined childhood risks of differing arrest trajectories across childhood through early adulthood (from ages 10–11 to 26–27 years) that were identified in prior work for 203 at-risk, predominantly Caucasian young men. Multivariate analyses revealed that when both distal (childhood risk factors) and proximal risk factors (deviant peer association as a time-varying covariate) were included in the model, relatively few childhood risk factors (assessed at age 9–10 years) discriminated the chronic offender groups from rare offenders (i.e., child antisocial behavior, child attention problems, parents’ antisocial behavior). Rather, deviant peer association was significantly related to levels of offending within each trajectory group (i.e., chronic and rare offender groups). No predictor differentially predicted membership in the two chronic groups, supporting the linear gradation argument. Theoretical and prevention implications are discussed.  相似文献   
706.
Plastic fingerprint impressions found at crime scenes are often too delicate for collection, leaving photography as the best option for documentation. However, traditional photography techniques can be inadequate in documenting minute 3-D details due to limitations of the camera and lighting conditions. This study investigated the feasibility of applying commercially available structured-light 3-D scanners in the documentation of plastic prints. Attempts were made to develop a procedure to extract curvature features from 3-D scanned fingerprints and flatten the friction ridge features into two-dimensional (2-D) images to allow direct comparison with the traditional photography in the CSIpix® Matcher and NFIQ 2.0 software. Two 3-D scanners were evaluated a Dentsply Sirona inEos X5® and an Artec Space Spider. In this study, 3-D scanners demonstrated robustness as well as efficiency in the collection of plastic fingerprint impressions in select substrates. One of the developed methods utilizing a discrete geometry operator and convexity features outperformed traditional photography, achieving higher software detection scores in minutiae count and match quality, while traditional photography could not always capture enough high-quality minutiae for comparisons, even after digital enhancement.  相似文献   
707.
ABSTRACT

This article reports the findings of field research into the vernacular understanding of security in South West Cameroon. It was found that security significantly contested; it is both objective and subjective; it is communal, whilst at the same time requiring individual l responsibility of personal security; it favours certainty and stability; it draws on a multiplicity of providers, and it goes beyond traditional conceptualisations. The findings make it clear that there are wide divergences between the typical state and donor driven security reform programmes, and people’s perceived security needs. The definition of security is challenged by popular understandings. In addition, though not rejecting the need for state security, it is evident that many more actors are engaged in security provision and personal safety than state actors, and that these actors need to be accounted for in reform programmes. Conclusion draw out advantages of the vernacular approach in security reform programmes.  相似文献   
708.
709.
The concept of self-tracking has recently begun to emerge in discussions of ways in which people can record specific features of their lives, often using digital technologies, to monitor, evaluate and optimize themselves. There is evidence that the personal data that are generated by the digital surveillance of individuals (dataveillance) are now used by a range of actors and agencies in diverse contexts. This paper examines the ‘function creep’ of self-tracking by outlining five modes that have emerged: private, communal, pushed, imposed and exploited. The analysis draws upon theoretical perspectives on concepts of selfhood, citizenship, dataveillance and the global digital data economy in discussing the wider socio-cultural implications of the emergence and development of these modes of self-tracking.  相似文献   
710.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号