全文获取类型
收费全文 | 993篇 |
免费 | 55篇 |
专业分类
各国政治 | 39篇 |
工人农民 | 65篇 |
世界政治 | 80篇 |
外交国际关系 | 60篇 |
法律 | 501篇 |
中国政治 | 15篇 |
政治理论 | 277篇 |
综合类 | 11篇 |
出版年
2023年 | 11篇 |
2022年 | 7篇 |
2021年 | 14篇 |
2020年 | 34篇 |
2019年 | 25篇 |
2018年 | 40篇 |
2017年 | 43篇 |
2016年 | 52篇 |
2015年 | 37篇 |
2014年 | 47篇 |
2013年 | 146篇 |
2012年 | 38篇 |
2011年 | 24篇 |
2010年 | 31篇 |
2009年 | 44篇 |
2008年 | 38篇 |
2007年 | 53篇 |
2006年 | 37篇 |
2005年 | 43篇 |
2004年 | 25篇 |
2003年 | 35篇 |
2002年 | 23篇 |
2001年 | 18篇 |
2000年 | 17篇 |
1999年 | 13篇 |
1998年 | 16篇 |
1997年 | 9篇 |
1996年 | 7篇 |
1995年 | 10篇 |
1994年 | 9篇 |
1993年 | 6篇 |
1992年 | 10篇 |
1991年 | 6篇 |
1990年 | 4篇 |
1989年 | 5篇 |
1988年 | 9篇 |
1986年 | 5篇 |
1985年 | 5篇 |
1984年 | 4篇 |
1983年 | 2篇 |
1982年 | 7篇 |
1981年 | 8篇 |
1980年 | 2篇 |
1979年 | 6篇 |
1978年 | 2篇 |
1977年 | 7篇 |
1976年 | 2篇 |
1975年 | 2篇 |
1970年 | 3篇 |
1968年 | 2篇 |
排序方式: 共有1048条查询结果,搜索用时 15 毫秒
981.
Eric Tagliacozzo 《Crime, Law and Social Change》2009,52(3):243-252
This article looks at the intersection between contraband and violence in Southeast Asia. I argue that the two activities
are often linked and play off one another in specific, contextualized ways. To make this case, I examine instances of smuggling
in the history of the region; through the trade in human beings, both historically and today; through the transit of narcotics,
again historically and today; and via the conduit of a range of other contraband cargoes. Race, religion, memory and geography
all factor into the outcome of when smuggling may take on violent forms. I chronicle these occasions throughout the width
and breadth of the region, stretching from the Thai/Burmese border in the north to the island world of Insular Southeast Asia
in the south. Throughout the essay, I pay particular attention to the larger milieus of commerce, politics, and society that
condition moments when acts of smuggling may in fact turn violent.
**NB: Most of the field-research for this piece (including local newspaper article accumulation) was done in the late 1990s
under a Fulbright grant. A subsequent Faculty Fulbright in 2004 supplemented much of this earlier research, and also allowed
me to travel to a number of other locales to make observations on this topic.
相似文献
Eric TagliacozzoEmail: |
982.
Bradley K. Tom M.S. Mikko T. Koskinen Ph.D. Melody Dayton M.S. Anna‐Maria Mattila M.S. Eric Johnston M.S. Dennis Fantin Ph.D. Sue DeNise Ph.D. Theresa Spear M.S. David Glenn Smith Ph.D. Jessica Satkoski Ph.D. Bruce Budowle Ph.D. Sree Kanthaswamy Ph.D. 《Journal of forensic sciences》2010,55(3):597-604
Abstract: Despite the popularity of dogs in US households, canine DNA evidence remains largely untapped in forensic investigations partially because of the absence of well‐defined forensic short tandem repeats (STRs), lack of standardized and validated PCR protocols, STR reagent kits, and poorly developed nomenclature. A nomenclature system was established based on internationally recognized recommendations for human forensic STRs for a recently developed canine STR reagent kit. Representative alleles were sequenced from each of the 18 STRs and the sex‐typing marker included in the kit. This study also reflects on the impact of point mutations, insertions, and deletions within and outside the STR core repeat structures. An understanding of the STRs’ sequence and repeat structures will enable development of a robust and reliable allele nomenclature and improve the accuracy and precision of allele fragment sizing in canine forensic profiling. The expected allele sizes have been calculated, and their repeat stuctures defined based on sequence information. 相似文献
983.
Political Behavior - Why does the likelihood of voting increase with education in the US? Prominent theories attribute education’s effect to human capital, which affords individuals resources... 相似文献
984.
Political Behavior - As numerous studies in the US and elsewhere document, voters often hold incumbents accountable for recent economic circumstances. However, our knowledge of the conditions that... 相似文献
985.
This article reports on preliminary findings and recommendations of a cross-discipline project to accelerate international business-to-business automated sharing of cyber-threat intelligence, particularly IP addresses. The article outlines the project and its objectives and the importance of determining whether IP addresses can be lawfully shared as cyber threat intelligence.The goal of the project is to enhance cyber-threat intelligence sharing throughout the cyber ecosystem. The findings and recommendations from this project enable businesses to navigate the international legal environment and develop their policy and procedures to enable timely, effective and legal sharing of cyber-threat information. The project is the first of its kind in the world. It is unique in both focus and scope. Unlike the cyber-threat information sharing reviews and initiatives being developed at country and regional levels, the focus of this project and this article is on business-to-business sharing. The scope of this project in terms of the 34 jurisdictions reviewed as to their data protection requirements is more comprehensive than any similar study to date.This article focuses on the sharing of IP addresses as cyber threat intelligence in the context of the new European Union (EU) data protection initiatives agreed in December 2015 and formally adopted by the European Council and Parliament in April 2016. The new EU General Data Protection Regulation (GDPR) applies to EU member countries, a major focus of the international cyber threat sharing project. The research also reveals that EU data protection requirements, particularly the currently applicable law of the Data Protection Directive 95/46/EC (1995 Directive) (the rules of which the GDPR will replace in practice in 2018), generally form the basis of current data protection requirements in countries outside Europe. It is expected that this influence will continue and that the GDPR will shape the development of data protection internationally.In this article, the authors examine whether static and dynamic IP addresses are “personal data” as defined in the GDPR and its predecessor the 1995 Directive that is currently the model for data protection in many jurisdictions outside Europe. The authors then consider whether sharing of that data by a business without the consent of the data subject, can be justified in the public interest so as to override individual rights under Articles 7 and 8(1) of the Charter of Fundamental Rights of the European Union, which underpin EU data protection. The analysis shows that the sharing of cyber threat intelligence is in the public interest so as to override the rights of a data subject, as long as it is carried out in ways that are strictly necessary in order to achieve security objectives. The article concludes by summarizing the project findings to date, and how they inform international sharing of cyber-threat intelligence within the private sector. 相似文献
986.
Site‐, Technique‐, and Time‐Related Aspects of the Postmortem Redistribution of Diazepam,Methadone, Morphine,and their Metabolites: Interest of Popliteal Vein Blood Sampling 下载免费PDF全文
Eric Lemaire M.D. Ph.D. Carl Schmidt M.D. Nathalie Dubois Ph.D. Raphael Denooz Ph.D. Corinne Charlier Ph.D. Philippe Boxho M.D. Ph.D. 《Journal of forensic sciences》2017,62(6):1559-1574
Sampling site, technique, and time influence postmortem drug concentrations. In 57 cases, we studied drug concentration differences as follows: subclavian vein‐dissection/clamping versus blind stick, femoral vein‐dissection/clamping versus blind stick, right cardiac chamber, and popliteal vein‐dissection and clamping only. Cases were distributed in group #1 (all cases with both techniques), group #2 (dissection/clamping), and group #3 (blind stick). Sampled drugs were diazepam, methadone, morphine, and their metabolites. To assess PMR, mean concentrations and ratios were calculated for each group. Time‐dependent variations of blood concentrations and ratios were also assessed. Results indicate that site, method, and time may influence postmortem distribution interpretation in different ways. Popliteal blood seems less subject to PMR. In conclusion, our study is the first to evaluate concurrently three main aspects of PMR and confirms that the popliteal vein may represent a site that is more resistant to the changes seen as a result of PMR. 相似文献
987.
988.
989.
Kacinko SL Barnes AJ Kim I Moolchan ET Wilson L Cooper GA Reid C Baldwin D Hand CW Huestis MA 《Forensic science international》2004,141(1):41-48
Oral fluid is an interesting alternative matrix for drug testing in many environments, including law enforcement, workplace drug testing, and drug treatment facilities. Performance characteristics of the FDA-cleared, qualitative, Cozart RapiScan Opiate Oral Fluid Drug Testing System (Opiate Cozart RapiScan System or Opiate CRS) were compared to the semi-quantitative Cozart Microplate EIA Opiate Oral Fluid Kit (Opiate ELISA) and to gas chromatography/mass spectrometry (GC/MS). The following oral fluid opiate cutoffs were evaluated: the GC/MS limit of quantification (LOQ) of 2.5 mg/l; 15 microg/l currently used for oral fluid testing in the United Kingdom (UK); 30 microg/l (Opiate CRS cutoff); and 40 microg/l, the proposed Substance Abuse and Mental Health Services Administration (SAMHSA) cutoff. Subjects provided informed consent to participate in this IRB-approved research and resided on the closed research ward throughout the study. Three oral codeine doses of 60 mg/70 kg were administered over a 7-day period. After a 3-week break, subjects received three doses of 120 mg/70 kg within 7 days. Oral fluid specimens (N = 1273) were analyzed for codeine (COD), norcodeine (NCOD), morphine (MOR) and normorphine (NMOR) by GC/MS with an LOQ of 2.5 microg/l for all analytes. MOR and NMOR were not detected in any sample; 26.5% of the specimens were positive for COD and 13.7% for NCOD. Opiate CRS uses a preset, qualitative cutoff of 10 microg/l; this is equivalent to 30 microg/l in undiluted oral fluid as the oral fluid collection process involves a 1:3 dilution with buffer. Sensitivity, specificity, and efficiency of Opiate CRS compared to Opiate ELISA were 98.6, 98.1, and 98.2% at a 30 microg/l cutoff and 99.0, 96.2, and 96.6% at a 40 microg/l cutoff. Compared to the much lower GC/MS LOQ of 2.5 microg/l, sensitivity, specificity and efficiency were 66.8, 99.3 and 90.7%. Increasing the GC/MS cutoff to the current UK level yielded performance characteristics of 81.5% (sensitivity), 99.3% (specificity), and 95.4% (efficiency). Using a GC/MS cutoff identical to the preset Opiate CRS cutoff yielded sensitivity, specificity, and efficiency of 88.5, 99.2, and 97.5%, respectively. At the proposed SAMSHA confirmation cutoff of 40 microg/l, sensitivity increased with little change in specificity and efficiency (91.3% sensitivity, 98.9% specificity, and 97.5% efficiency). Oral fluid is a suitable matrix for detecting drugs of abuse. Opiate CRS, with a 30 microg/l cutoff, is sufficiently sensitive, specific and efficient for oral fluid opiate analysis, performing similarly to Opiate ELISA at the same cutoff, and having performance characteristics >91% when compared to GC/MS at the proposed SAMHSA cutoff. 相似文献
990.