首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1355篇
  免费   56篇
各国政治   91篇
工人农民   91篇
世界政治   91篇
外交国际关系   77篇
法律   672篇
中国政治   47篇
政治理论   340篇
综合类   2篇
  2023年   13篇
  2022年   11篇
  2021年   16篇
  2020年   37篇
  2019年   42篇
  2018年   59篇
  2017年   49篇
  2016年   58篇
  2015年   35篇
  2014年   42篇
  2013年   201篇
  2012年   43篇
  2011年   46篇
  2010年   40篇
  2009年   47篇
  2008年   52篇
  2007年   53篇
  2006年   40篇
  2005年   43篇
  2004年   31篇
  2003年   33篇
  2002年   30篇
  2001年   33篇
  2000年   32篇
  1999年   27篇
  1998年   10篇
  1997年   18篇
  1996年   13篇
  1995年   21篇
  1994年   16篇
  1993年   17篇
  1992年   21篇
  1991年   21篇
  1990年   13篇
  1989年   10篇
  1988年   9篇
  1987年   11篇
  1986年   12篇
  1985年   12篇
  1984年   8篇
  1983年   11篇
  1982年   6篇
  1981年   12篇
  1980年   4篇
  1979年   6篇
  1978年   9篇
  1977年   4篇
  1974年   4篇
  1969年   4篇
  1967年   5篇
排序方式: 共有1411条查询结果,搜索用时 31 毫秒
191.
Gender inequality has been empirically linked to the incidence of terrorism, as a motivator for women’s involvement in terrorism, and political and social violence more generally. Although these studies demonstrate that advances in gender equality on average decrease terrorism, it is unclear how these influences translate to individual nations or conflicts. Because Turkey has witnessed consistent but unequal regional advances in gender equality, it provides an ideal setting to examine how these developments have influenced terrorist violence. Analyzing data from Turkey’s 81 provinces from 2000–2013, this study finds important regional differences in the influence of gender equality on terrorism.  相似文献   
192.
Abstract

Building on studies on the political business cycle, the literature on welfare state retrenchment has argued that governments which cut the welfare state try to avoid blame by implementing painful measures in the beginning of the mandate and expanding benefits as elections approach. In contrast to this linear relationship, this article argues that governments often feel pressured to fulfil (mostly expansionary) campaign promises during the first months in office. Consequently, cutting right away is not what should be expected. Instead, a more nuanced, U-shaped timing trajectory is probable with a period in the beginning characterised by both cuts and fulfilment of expansionary pledges, followed by a period of cutbacks, and finally an expansive phase towards the end of a mandate. This argument is tested on our new original dataset of legislative changes in five European countries – Britain, Denmark, Finland, France and Germany – during the last four decades.  相似文献   
193.
194.
195.
196.
Lipstick can be an important piece of evidence in crimes like murders, rapes, and suicides. Due to its prevalence, it can be an important corroborative evidence in crime reconstruction. The analysis of such evidence can provide an evidentiary link between the suspect, the victim, object, or the crime scene. We report the use of nondestructive ATR-FTIR spectroscopy combined with chemometrics for the classification of 10 brands of lipsticks with nine samples each. Chemometric method of partial least square-discriminant analysis (PLS-DA) has been employed to interpret the data and classify the samples into their respective classes. The PLS-DA model provides an AUC figure above 0.99 in all brands except one; for which it is slightly less at 0.94. We have also tested the traces of these lipstick samples on different substrates treating them as unknowns in the already trained PLS-DA model. 100% of the samples on nine substrates viz. a cotton, nylon, plastic, dry tissue, denim (blue jeans), wet tissue, nitrile gloves, white paper, and polyester were correctly attributed to their source brand. In conclusion, the results suggest that ATR-FTIR combined with the chemometrics is a rapid, nondestructive, and accurate method for the discrimination and source attribution of lipstick. This study has potential for use in actual forensic casework conditions.  相似文献   
197.
Fentanyl has emerged as the most prolific drug in the ongoing opioid epidemic and has greatly impacted traffic safety in recent years. This study aimed to evaluate fentanyl prevalence and concentrations in blood and oral fluid in driving under the influence of drugs (DUID) cases in three different regions (i.e., Alabama, Orange County, CA, and Houston, TX) from 2017 to 2022. Furthermore, traffic fatalities were evaluated for Alabama and Orange County, CA. Fentanyl positivity in DUID and traffic fatalities increased for most years in this study. In Alabama, the prevalence of fentanyl DUID cases increased 4-fold in 2022 compared to 2017. Orange County's increase from 2017 to 2022 was 14-fold. In Houston, the increase was approximately 2-fold from 2019 to 2022. The greatest increase for all laboratories coincided with the start of the COVID-19 pandemic. In 2022, the median fentanyl DUID blood concentrations were 4.7, 11, and 4.7 ng/mL in Alabama, Orange County, and Houston, respectively. Most fentanyl cases were polydrug cases (≥90%). Methamphetamine, THC, and alprazolam were the most frequently detected drugs in combination with fentanyl. Alabama has collected oral fluid and blood in DUID cases since 2018. The detection of fentanyl in oral fluid was comparable to blood. However, 59% and 8.7% of fentanyl-positive cases had concentrations of >20 ng/mL in oral fluid and blood, respectively. Therefore, oral fluid as an alternative or supplemental specimen to blood is an attractive approach for fentanyl in DUID cases. This study contributes to understanding recent fentanyl trends and their impact on traffic safety.  相似文献   
198.
Digital video is used in criminal trials as evidence with legal responsibility because video content vividly depicts events occurring at a crime scene. However, using sophisticated video editing software, assailants can easily manipulate visible clues for their own benefit. Therefore, the integrity of digital video files acquired or submitted as evidence must be ensured. Forensic analysis of digital video is key to ensuring the integrity of links with individual cameras. In this study, we analyzed whether it is possible to ensure the integrity of MTS video files. Herein, we propose a method to verify the integrity of MTS files encoded by advanced video coding high definition (AVCHD), which is frequently used for video recording. To verify MTS file integrity, we propose five features. Codec information, picture timing, and camera manufacture/model are modified AVI and MP4-like format video verification features. Group of pictures and Universally Unique Identifier patterns were specifically developed for MTS streams. We analyzed the features of 44 standard files recorded using all recording options of seven cameras. We checked whether integrity can be validated on unmanipulated videos recorded in various environments. In addition, we considered whether manipulated MTS files edited in video editing software could be validated. Experimental results show that all unmanipulated and manipulated MTS files with known recording devices were discriminated only when all five features were checked. These results show that the proposed method verifies the integrity of MTS files, strengthening the validity of MTS file-based evidence in trials.  相似文献   
199.
Anti-forensic technology can play an effective role in protecting information, but it can make forensic investigations difficult. Specifically, file-wiping permanently erases evidence, making it challenging for investigators to determine whether a file ever existed and prolonging the investigation process. To address this issue, forensic researchers have studied anti-forensic techniques that detect file-wiping activities. Many previous studies have focused on the effects of file-wiping tools on $MFT, $LogFile, and $DATA, rather than on Windows artifacts. Additionally, previous studies that have examined Windows artifacts have considered different artifacts, making it difficult to study them in a comprehensive manner. To address this, we focused on analyzing traces in 13 Windows artifacts of 10 file-wiping tools' operations in the Windows operating system comprehensively. For our experiments, we installed each file-wiping tool on separate virtual machines and checked the traces that the tools left behind in each artifact. We then organized the results in a database format. Our analysis revealed that most of the tools left traces on other artifacts, except for JumpList, Open&SavePidlMRU, and lnk. There were also some cases where traces remained on the other three artifacts. Based on our research, forensic investigators can quickly identify whether a file-wiping tool has been used, and it can assist in decision-making for evidence collection and forensic triage.  相似文献   
200.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号