首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   652篇
  免费   23篇
各国政治   47篇
工人农民   41篇
世界政治   54篇
外交国际关系   37篇
法律   320篇
中国政治   7篇
政治理论   142篇
综合类   27篇
  2023年   8篇
  2022年   3篇
  2021年   9篇
  2020年   10篇
  2019年   11篇
  2018年   20篇
  2017年   21篇
  2016年   21篇
  2015年   19篇
  2014年   23篇
  2013年   84篇
  2012年   13篇
  2011年   29篇
  2010年   16篇
  2009年   15篇
  2008年   21篇
  2007年   25篇
  2006年   29篇
  2005年   26篇
  2004年   17篇
  2003年   9篇
  2002年   21篇
  2001年   19篇
  2000年   14篇
  1999年   10篇
  1998年   8篇
  1997年   4篇
  1996年   6篇
  1995年   7篇
  1994年   6篇
  1993年   11篇
  1992年   7篇
  1991年   15篇
  1990年   13篇
  1989年   11篇
  1988年   4篇
  1987年   5篇
  1986年   4篇
  1985年   11篇
  1984年   3篇
  1983年   10篇
  1982年   6篇
  1981年   5篇
  1980年   4篇
  1979年   3篇
  1978年   7篇
  1977年   7篇
  1976年   5篇
  1971年   3篇
  1969年   6篇
排序方式: 共有675条查询结果,搜索用时 15 毫秒
151.
152.
153.
154.
155.
Both solution and solid state Nuclear Magnetic Resonance (NMR) spectroscopic techniques have been used to determine differences in commercially available condoms. Whilst solid state NMR is useful for determining the polymer backbone, it is not useful for forensic analysis due to the commonality of the latex condom. However solution NMR spectra obtained following a simple extraction procedure using hexane, provides a fingerprint of the additives in the lubricants. Following the development of a flow chart, basing decisions on the presence of particular peaks present in the solution spectra, 33 of 38 condoms could be individualized. Samples were also analyzed after having the lubricant manually removed and soaking the condom in water for 3 to 24 h. These experiments were performed to simulate a case of the sample having been used and disposed of by flushing down the toilet, as may be experienced in a case of a sexual assault. The results indicated that the only significant water soluble component was polyethylene glycol. The overall results suggest that the method developed may be a quick and useful technique in characterizing condoms. The information obtained can be used to provide associative evidence between suspect and crime, and so be useful in sexual assault cases.  相似文献   
156.
157.
158.
As part of a larger study of probation workload and workforce challenges in one southeastern state, this study reports the results from a statewide survey of probation officers’ experiences supervising probationers with mental illness. A total of 615 officers responded to closed- and open-ended questions about the challenges and barriers to supervising offenders with mental illness, and the responses of officers from rural versus urban settings were compared. Officers reported that probationers with mental illness are difficult to supervise and supervision challenges are exacerbated by a scarcity of mental health and substance abuse treatment resources, limited social support, and a lack of employment opportunities for this population of probationers. Officers report unique and similar challenges across rural and urban settings. This study contributes to our understanding of the challenges of supervising probationers with mental illness and informs practice, policy and research at the interface of the criminal justice and mental health systems.  相似文献   
159.
This paper discusses the implications of community involvement for the delivery of public services. It discusses exemplary case studies of community involvement in government, and provides an in-depth discussion of community participation in the affairs of the Engineering Traffic Division in San Diego, California. It finds a positive relationship between community involvement, and responsiveness, customer satisfaction, efficiency and effectiveness.  相似文献   
160.
In the UK, the Joint Intelligence Committee (JIC) has a poor track record of predicting attack. In the US, official inquiries into 9/11 identified ‘a failure of imagination’ to conceive of a large scale threat to the American homeland. There is a long-standing literature on surprise attack which emphasizes that clues to predict attack often exist but are not pieced together by an intelligence sector which is not structured to look in the right direction. In a world of increasingly fragmented threats and weak signals, it is apparent that much of the challenge in intelligence work now lies not in collection but in managing requirements, setting priorities, and conducting incisive analysis based on the ability to imagine new threats. One solution to a failure of imagination is to widen the range of people who can contribute to the task. Non-Governmental analysis of security issues, whether by academia, civil society or the private sector, can help to identify emerging issues and set priorities. Whilst collection of secret intelligence may always remain the preserve of specialist Government agencies, the rest of the intelligence cycle can benefit from external contributions and open source intelligence. We argue that the process of setting intelligence requirements could be opened to a wider range of actors. In conflict environments, there may be particular value in an open process to identify what each side would need to know about the other to confidently seek peace.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号