首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2294篇
  免费   120篇
各国政治   187篇
工人农民   131篇
世界政治   263篇
外交国际关系   163篇
法律   1192篇
中国政治   8篇
政治理论   450篇
综合类   20篇
  2023年   26篇
  2022年   18篇
  2021年   38篇
  2020年   60篇
  2019年   91篇
  2018年   123篇
  2017年   141篇
  2016年   142篇
  2015年   97篇
  2014年   128篇
  2013年   388篇
  2012年   106篇
  2011年   91篇
  2010年   62篇
  2009年   60篇
  2008年   89篇
  2007年   101篇
  2006年   67篇
  2005年   50篇
  2004年   63篇
  2003年   51篇
  2002年   45篇
  2001年   40篇
  2000年   36篇
  1999年   20篇
  1998年   22篇
  1997年   13篇
  1996年   14篇
  1995年   18篇
  1994年   14篇
  1993年   14篇
  1992年   11篇
  1991年   16篇
  1990年   11篇
  1989年   9篇
  1988年   9篇
  1987年   13篇
  1986年   6篇
  1985年   9篇
  1984年   14篇
  1983年   7篇
  1982年   11篇
  1976年   4篇
  1975年   5篇
  1974年   8篇
  1972年   10篇
  1971年   4篇
  1967年   5篇
  1966年   5篇
  1965年   5篇
排序方式: 共有2414条查询结果,搜索用时 15 毫秒
921.
Recent developments on postmortem interval estimation (PMI) take an advantage of the autolysis process, pointing out to the analysis of the expression of apoptosis and autophagy genes towards this purpose. Oxidative stress plays a role in this signaling as a regulatory mechanism and/or as a consequence of cell death. Additionally, melatonin has been implicated on apoptosis and autophagy signaling, making melatonin a suitable target for PMI determination. The aim of this study was to investigate the early PMI through the analysis of the expression of autophagy genes as well as oxidative stress and melatonin receptor. Our results demonstrated a rapidly increased on the expression of autophagy genes according to the expected sequence of events, then a marked decrease in this expression, matched with the switch to the apoptosis signaling. These results revealed potential candidates to analyze the PMI in the first hours of death, helping to estimate the time-since-death.  相似文献   
922.
Previous research suggests that bill initiation is a mechanism used by legislators to foster personal votes. This article puts forward a theory whereby legislative activity is understood as a form of party service. Bill initiation records are used by parties to inform their decisions on who is ready to be promoted. The theory is evaluated using an original data-set from the Chilean Chamber of Deputies. Our empirical findings make a strong case for the hypothesis according to which parties reward those deputies who have shown to be effective legislators.  相似文献   
923.
Gunshot residues (GSR) are an important forensic trace in firearm-related events. Currently, routine GSR analyses focus on the detection and characterisation of the inorganic components (IGSR). The increasing prevalence of heavy metal-free ammunition challenges these current protocols and there is an increasing interest in how the organic components of GSR (OGSR) can provide complementary information. Similar to the situation with IGSR, OGSR compounds originally deposited on the shooter during the firing process may further be transferred onto another individual or surface. Hence, the aim of this study was to provide additional information regarding the risk of a secondary transfer of OGSR. Two scenarios were investigated, the first one related to the arrest process and the possibilities of a secondary transfer arising between a shooter onto a non-shooter (e.g. between a police officer and a person of interest (POI)). The second scenario concerned the transfer of OGSR onto the non-shooter after handling a firearm for few minutes without discharging it. One calibre was chosen, the .40 S&W calibre, used by several Australian State police forces. A secondary transfer was observed in all cases for the two scenarios investigated, for three compounds of interest: ethylcentralite (EC), diphenylamine (DPA), N-nitrosodiphenylamine (N-nDPA). The firearm handling scenario resulted in a larger secondary transfer to that of the arrest scenario. Overall, the amounts of OGSR detected on the non-shooter were generally lower than that detected on the shooter and controls after the arrest scenario. The results of this study provide complementary knowledge about OGSR, which can be further used to improve the current practice and the interpretation of OGSR evidence. In particular, it highlights that the secondary transfer proposition must be considered during the interpretation of forensic findings, especially when small amounts of OGSR target compounds are detected.  相似文献   
924.
Minecraft, a Massively Multiplayer Online Game (MMOG), has reportedly millions of players from different age groups worldwide. With Minecraft being so popular, particularly with younger audiences, it is no surprise that the interactive nature of Minecraft has facilitated the commission of criminal activities such as denial of service attacks against gamers, cyberbullying, swatting, sexual communication, and online child grooming. In this research, there is a simulated scenario of a typical Minecraft setting, using a Linux Ubuntu 16.04.3 machine (acting as the MMOG server) and Windows client devices running Minecraft. Server and client devices are then examined to reveal the type and extent of evidential artefacts that can be extracted.  相似文献   
925.
This paper uses data on tenth graders from the 2016 Caring Communities Youth Survey (CCYS) to examine the lifetime abstainer from drugs. The abstainer has been a part of Life Course Development literature; within each of the several ages of onset models. Using a model which examines the abstainer from each drug and all drugs, the effect of Prosocial Factors (peer and school) are examined. Findings indicate a very low relationship between high protective/prosocial factors and abstaining. The research of Moffitt that there may be several subtypes of abstainers is supported.  相似文献   
926.
Journal of Experimental Criminology - This study introduces the California Crime Harm Index (CA-CHI) and explores in what context a Crime Harm Index is a meaningful measure, comparing crime count...  相似文献   
927.
Communication apps can be an important source of evidence in a forensic investigation (e.g., in the investigation of a drug trafficking or terrorism case where the communications apps were used by the accused persons during the transactions or planning activities). This study presents the first evidence‐based forensic taxonomy of Windows Phone communication apps, using an existing two‐dimensional Android forensic taxonomy as a baseline. Specifically, 30 Windows Phone communication apps, including Instant Messaging (IM) and Voice over IP (VoIP) apps, are examined. Artifacts extracted using physical acquisition are analyzed, and seven digital evidence objects of forensic interest are identified, namely: Call Log, Chats, Contacts, Locations, Installed Applications, SMSs and User Accounts. Findings from this study would help to facilitate timely and effective forensic investigations involving Windows Phone communication apps.  相似文献   
928.
Some researchers suggest that the observed boom in the levels of violence in Mexico since 2008 are a consequence of placing federal military forces in states with a significant organized crime presence. However, little has been said about the role of the changeable, competitive, and violent nature of criminal organizations on this increasing violence. Using the literature on inter- and intra-state conflicts as matter of analogy to explain organized crime developments in Mexico, fragmentation and cooperation seem to be determinant forces that alter the equilibrium within Mexican criminal groups, affecting their territorial control. By using a private dataset gathered by the Drug Policy Program at the Center for Economic Research and Teaching (CIDE), we examine the evolution of criminal organizations in Mexico by focusing on their different alliances and fragmentations from December 2006 to December 2011. Our analysis suggests that violence is a consequence not only of the law enforcement actions, but also of the fragmentation and cooperation within and between private groups.  相似文献   
929.
In May 2018, the process which may ultimately lead to the negotiation of a legally binding Global Pact for the environment formally commenced under the auspices of the United Nations General Assembly. Expectations for the Pact are high, evidenced in particular by its multiple and overlapping objectives: to serve as a generic binding instrument of international environmental law (IEL) principles; to integrate, consolidate, unify and ultimately entrench many of the fragmented principles of IEL; and to constitute the first global environmental human rights instrument. In the wake of the impending intergovernmental process, the paper offers a thorough critique of the draft Pact in its present iteration. We do so with the aim of evaluating the strengths and weaknesses of the present draft Pact by interrogating: (a) its diplomatic and symbolic relevance and possible unique contribution at the policy level to global environmental law and governance, and (b) its potential at the operational level of IEL and global environmental governance, focusing on the extent to which the draft Pact accommodates both existing and more recent rules and principles for environmental protection. As the Pact’s primary ambition is to become a universally binding global treaty, it would be churlish not to recognise its potential for innovation, as well as the considerable opportunity that the negotiation of the Pact will have to generate broad-sweeping and positive impacts. However, our central thesis is that only if the Global Pact were to incorporate ambitious normative provisions to strengthen those public and private global governance efforts that aim to halt the deterioration of Earth system integrity, as well as to maintain and improve integrity, will it be able to offer a firm foundation of the type of Anthropocene Law, termed here as the Lex Anthropocenae, required to confront head-on the deep socio-ecological crisis of the Anthropocene.  相似文献   
930.
Drawing on Sutherland’s theory of behaviour systems in crime, this study investigates social media fraud (SMF) facilitated by botnets to understand the onset and maturation of this new online offending behaviour. We find legitimate actors in the system – Internet of Things manufacturers, online social networks, hosting companies and law enforcement agencies – share a way of life that prioritises private gains and avoids implicit responsibility for security. They arrive at a Nash equilibrium that provides a weak and disorganised social response to crime. SMF providers, on the other hand, are cleverly organised and exploit weaknesses in security, adapting to change and developing working relationship with those who benefit from their activities and share their lenient behaviour towards fraudulent activities. We conclude that the rise in cybercrime is a result of the behaviours of all actors in the system, not just those who offend.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号