首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18458篇
  免费   1261篇
各国政治   794篇
工人农民   896篇
世界政治   1270篇
外交国际关系   596篇
法律   12694篇
中国共产党   2篇
中国政治   107篇
政治理论   3255篇
综合类   105篇
  2023年   87篇
  2021年   94篇
  2020年   441篇
  2019年   471篇
  2018年   594篇
  2017年   611篇
  2016年   706篇
  2015年   526篇
  2014年   570篇
  2013年   1969篇
  2012年   513篇
  2011年   528篇
  2010年   549篇
  2009年   588篇
  2008年   544篇
  2007年   534篇
  2006年   540篇
  2005年   463篇
  2004年   466篇
  2003年   382篇
  2002年   432篇
  2001年   717篇
  2000年   650篇
  1999年   502篇
  1998年   255篇
  1997年   188篇
  1996年   204篇
  1995年   200篇
  1994年   185篇
  1993年   187篇
  1992年   320篇
  1991年   330篇
  1990年   315篇
  1989年   291篇
  1988年   322篇
  1987年   276篇
  1986年   333篇
  1985年   333篇
  1984年   259篇
  1983年   240篇
  1982年   189篇
  1981年   160篇
  1980年   149篇
  1979年   230篇
  1978年   120篇
  1977年   94篇
  1975年   100篇
  1974年   129篇
  1973年   88篇
  1972年   84篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
The psychological assessment battery is an integral part of the selection process used to select patrol officer applicants. Unlike all other procedures used in the selection process, the psychological assessment has not been adequately validated. The purpose of this study was an attempt to provide validation data for a psychological assessment battery. The battery consisted of the Nelson-Denny, Shipley-Hartford, MMPI, and the Motivational Analysis Test (MAT). Performance measures included various measures of training academy performance and field training performance. A stepwise regression and MANOVA/Discriminant Analysis indicated that the psychological tests did predict performance, although an exact predictive equation could not be developed due to the high intercorrelations between predictor variables. This research was sponsored in part by a grant from the School of Applied Arts and Technology, Southwest Texas State University.  相似文献   
102.
103.
104.
Conclusion The Regulations appear to have reinforced the protection available to software producers under United Kingdom law. The provisions of the Software Directive and the Regulations are complex and not without significant inconsistencies which are likely to prove to be a source of litigation. The drafters of the Regulations chose, unlike many of its European partners, not to adopt the wording of the Software Directive but to write their own interpretation, adding an element of uncertainty to the law in this area, which is perhaps inevitable bearing in mind the linguistic problems of translating and interpreting any directive coupled with the ambiguity and omission of definitions of several key terms. More important, however, than any academic argument will be the practical impact of the new law and its effectiveness in achieving its aim.  相似文献   
105.
106.
107.
Social scientists have theorized about the cycle of domestic violence in family abuse. Little research has addressed dating violence as a consequence to the experience of domestic violence by children. This article deals with the self-reported experience of dating violence by high school students from abusive and nonabusive households. A survey was conducted of 1,353 students in a rural area of North Dakota. Results indicated that students from abusive households showed significantly higher incidence of dating violence than those from homes where no abuse was evident. However, less than one in five of the students from abusive home reported dating violence, providing little support for the cycle of violence hypothesis. Students from abusive homes viewed violence as negatively as students from nonabusive homes. Thus, while there are significant differences between the two groups, there are also important similarities. Although there is apparently a greater risk of dating violence among students who have experienced violence at home, these data do not support the idea of an inescapable pattern of violence among adolescents who have experienced violence themselves.  相似文献   
108.
Andrew M. Greeley is a priest, sociologist, novelist, and journalist. His scholarly writings concentrate on religion and ethnicity. His other writings range from critiques of the Catholic church to best-selling novels.  相似文献   
109.
Conclusion We have in this paper tried to set out a framework which can facilitate analysis of the current and future situation of traditional rulership in contemporary African society. Our presentation of a proposed model for such an analysis is no doubt still in its elementary stages of formation. Much more work needs to be done. Nevertheless, our analysis has revealed certain salient elements and uncovered certain unresolved issues. If traditional rulers genuinely care about their own future they will have to devise techniques of legitimation which not only endear them to the government and the non-traditional elites, but also, and more importantly, to the mass of the people. True, the original role of the traditional rulers may be no more; still, it may be possible to salvage what is left.  相似文献   
110.
The authors examine the characteristics of threatening and otherwise inappropriate communications sent to members of the U.S. Congress by a sample of 86 subjects, 20 of whom threatened assassination. We quote excerpts from these letters and provide quantitative data on such variables as the volume, duration, form, and appearance of such communications; the enclosures; the subjects' perceived relationships to the recipients; the thematic content of the communications; and the messages and threats communicated. Comparisons between 43 subjects who pursued encounters with members of Congress and 43 who did not revealed 17 factors associated with such pursuit. In this population, threateners were significantly less likely to pursue an encounter than inappropriate letter writers who did not threaten, regardless of the type of threat or the harm threatened. Inappropriate letters to members of Congress are compared with those directed to Hollywood celebrities. Mentally disordered persons writing to public figures often mention and sometimes threaten public figures other than those to whom the letters are addressed, which raises important issues regarding notification of endangered third parties and the sharing of information among protective agencies.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号