首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1041篇
  免费   62篇
各国政治   111篇
工人农民   56篇
世界政治   102篇
外交国际关系   89篇
法律   450篇
中国政治   24篇
政治理论   263篇
综合类   8篇
  2023年   10篇
  2022年   7篇
  2021年   15篇
  2020年   22篇
  2019年   45篇
  2018年   53篇
  2017年   60篇
  2016年   51篇
  2015年   30篇
  2014年   28篇
  2013年   222篇
  2012年   27篇
  2011年   44篇
  2010年   22篇
  2009年   27篇
  2008年   41篇
  2007年   41篇
  2006年   42篇
  2005年   21篇
  2004年   24篇
  2003年   18篇
  2002年   29篇
  2001年   13篇
  2000年   19篇
  1999年   14篇
  1998年   16篇
  1997年   11篇
  1996年   6篇
  1995年   6篇
  1994年   15篇
  1993年   4篇
  1992年   10篇
  1991年   8篇
  1990年   10篇
  1989年   5篇
  1988年   4篇
  1987年   11篇
  1986年   5篇
  1985年   4篇
  1984年   7篇
  1983年   7篇
  1982年   4篇
  1981年   4篇
  1980年   4篇
  1979年   5篇
  1978年   3篇
  1977年   4篇
  1975年   3篇
  1972年   4篇
  1966年   4篇
排序方式: 共有1103条查询结果,搜索用时 15 毫秒
181.
182.
This article describes a New Zealand forensic agency's contextual information management protocol for bloodstain pattern evidence examined in the laboratory. In an effort to create a protocol that would have minimal impact on current work-flow, while still effectively removing task-irrelevant contextual information, the protocol was designed following an in-depth consultation with management and forensic staff. The resulting design was for a protocol of independent-checking (i.e. blind peer-review) where the checker's interpretation of the evidence is conducted in the absence of case information and the original examiner's notes or interpretation(s). At the conclusion of a ten-case trial period, there was widespread agreement that the protocol had minimal impact on the number of people required, the cost, or the time to complete an item examination. The agency is now looking to adopt the protocol into standard operating procedures and in some cases the protocol has been extended to cover other laboratory-based examinations (e.g. fabric damage, shoeprint examination, and physical fits). The protocol developed during this trial provides a useful example for agencies seeking to adopt contextual information management into their workflow.  相似文献   
183.
ABSTRACT

Research into the interaction between deliberate harm of animals and potential risk for human directed violence has burgeoned in the past two decades. In light of an underlying premise that attitudes are predictive of behaviour, a number of researchers have examined demographic and personality variables that affect attitudes to, and by extrapolation behaviours towards, animals. One particularly active topic of research in this area is the potential relation between human-directed empathy and attitudes to animals, with researchers consistently finding that those with higher human-directed empathy scores tend to hold more pro-animal welfare attitudes. The current study adds to this literature by evaluating the effect of different animal types (Pet, Pest or Profit) in this overall animal attitude/human-directed empathy relationship with a large (n?=?1606), community-based, Australian sample. As anticipated, attitudes towards animals in the Pet category were significantly more pro-welfare than for either Pest or Profit animals and women indicated more pro-welfare attitudes across all three than men. The strength and significance of the relation between human-directed empathy and attitudes to animals varied across Pet, Pest and Profit animal categories and affective vs cognitive empathy. The strongest correlation was found between Pet and the Empathic Concern subscale of the Davis Interpersonal Reactivity Index. The implications of these differences for the previously observed link between attitudes to animals and empathy, humane education and future research directions are discussed.  相似文献   
184.
Abstract

Although China's armed forces have yet to complete its ambitious modernization program, its military strategy has begun to emphasize the ability to conduct noncombat operations such as disaster relief and peacekeeping in addition to traditional war fighting. This new component of China's military strategy is best explained by an unexpected relationship between economic growth and regime security. Although growth is key to the legitimacy of leaders in developing countries, it also creates new sources of domestic unrest and increases the vulnerability of the economy to external shocks, both of which, if unchecked, can harm future growth. As a result, developing countries such as China may use their armed forces to maintain political stability and provide services that the state lacks, such as emergency disaster relief. These conclusions are based on original data from China.  相似文献   
185.
186.
The recent reforms in Myanmar were not brought about by Western sanctions or some contingent event, but rather planned well in advance,. For there is more continuity than change in Myanmar's political system, which is dominated by the practitioners of national power-the army and the bureaucracy. Of course there are new actors, principally Aung San Suu Kyi and the party she leads, the NLD. Yet the reality remains: state security has to be maintained. Rebalancing with ASEAN, India and now the West is helpful in terms of independence vis a vis China. This is not an invitation to the West to attempt to subvert the existing order.  相似文献   
187.
This article undertakes a critical assessment of Francis Fukuyama's interpretation of the end of apartheid. It is argued that Fukuyama's analysis, which rests on linking economic growth to democracy, falls short in the depth of its empirical analysis and fails to establish the necessary causal connection. The appeal of Fukuyama's approach is therefore explained in terms of its ideological context and function.  相似文献   
188.
Abstract

The present study sought to identify consistent patterns in the actions of sexually violent offenders to determine whether sexual homicide and rape reflect different behavioral emphasis of a single thematic model of sexual assault. Crime scene behaviors of 74 (37 sexual homicides and 37 rapes) solved cases of sexual assaults were compared, and results of a multi-dimensional analysis revealed three thematic styles of interacting with the victim during a sexual assault (Exploit, Control, and Violent). Further analysis indicated that offender–victim interactions in sexual homicide and rape are predominantly distinguished by the degree of violence, such that behaviors associated with each type of offense were found to occur in two discrete areas along a single continuum. Findings are discussed in terms of producing a general framework for understanding sexual violent interactions.  相似文献   
189.
190.
Abstract

This year, over 630,000 prisoners will be released from state and federal prisons across the country—more than four times as many as were released in 1980. In this article, we examine the scope of the prisoner reentry issue—what is known about the intersection of housing, homelessness, and reentry and about the barriers returning prisoners face in securing safe and affordable housing.

Although the housing challenges are formidable, progress is being made on numerous fronts. We seek to frame the dynamics of the reentry housing discussion by highlighting the promising strategies that are emerging. These strategies, taken to scale, could help create a very different national policy on prisoner reentry. Ultimately, effective reentry strategies have the potential not only to reduce re‐arrest and increase public safety, but also to reduce homelessness.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号