全文获取类型
收费全文 | 647篇 |
免费 | 12篇 |
专业分类
各国政治 | 34篇 |
工人农民 | 24篇 |
世界政治 | 53篇 |
外交国际关系 | 65篇 |
法律 | 283篇 |
中国政治 | 6篇 |
政治理论 | 192篇 |
综合类 | 2篇 |
出版年
2023年 | 4篇 |
2021年 | 4篇 |
2020年 | 14篇 |
2019年 | 9篇 |
2018年 | 17篇 |
2017年 | 16篇 |
2016年 | 20篇 |
2015年 | 11篇 |
2014年 | 14篇 |
2013年 | 76篇 |
2012年 | 16篇 |
2011年 | 17篇 |
2010年 | 24篇 |
2009年 | 14篇 |
2008年 | 23篇 |
2007年 | 24篇 |
2006年 | 18篇 |
2005年 | 19篇 |
2004年 | 24篇 |
2003年 | 25篇 |
2002年 | 19篇 |
2001年 | 16篇 |
2000年 | 15篇 |
1999年 | 12篇 |
1998年 | 11篇 |
1997年 | 9篇 |
1996年 | 12篇 |
1995年 | 14篇 |
1994年 | 10篇 |
1993年 | 10篇 |
1992年 | 14篇 |
1991年 | 10篇 |
1990年 | 9篇 |
1989年 | 9篇 |
1988年 | 8篇 |
1987年 | 8篇 |
1986年 | 7篇 |
1985年 | 13篇 |
1984年 | 8篇 |
1983年 | 5篇 |
1982年 | 4篇 |
1981年 | 8篇 |
1980年 | 7篇 |
1979年 | 5篇 |
1978年 | 4篇 |
1976年 | 3篇 |
1975年 | 4篇 |
1974年 | 4篇 |
1971年 | 2篇 |
1968年 | 2篇 |
排序方式: 共有659条查询结果,搜索用时 0 毫秒
601.
602.
603.
Raisanen J Ghougassian DF Moskvitch M Lawrence C 《The American journal of forensic medicine and pathology》1999,20(1):70-72
Sections of the cerebrum, cerebellum, and brain stem of a rugby player who died 15 hours after being tackled were stained using an immunoperoxidase technique to detect beta-amyloid protein. The sections of the pons showed axonal spheroids in the base, and those of the cerebellum showed axonal spheroids in deep white matter. The findings demonstrated axonal injury following a fall from the victim's height in a team sporting event. 相似文献
604.
Ludwig Niewoehner Ph.D. ; Jan Andrasko Ph.D. ; Jan Biegstraaten B.Sc. ; Lawrence Gunaratnam M.Sc. ; Sylvia Steffen Ph.D. ; Steffen Uhlig Ph.D. ; Sabine Antoni M.Sc. 《Journal of forensic sciences》2008,53(1):162-167
Abstract: Within the framework of the ENFSI Expert Working Group "Firearms" a proficiency test on the detection and identification of GSR by energy-dispersive scanning electron microanalysis (SEM/EDX) is carried out in a 2 years term. The latest test was performed in 2005/2006 and was denoted as GSR2005 . Seventy-five laboratories from 28 countries participated in this proficiency test and submitted in total 83 independent data-sets. The participating laboratories were requested to determine the total number of PbSbBa containing particles on a synthetic test sample following their own laboratory specific methods of automated GSR particle search and detection by SEM/EDX. Furthermore size and position of the detected particles had to be reported by the laboratories and were evaluated statistically. The results were compiled by means of z -scores according to the IUPAC and EURACHEM guidelines—assessing individual laboratory achievements (inter-laboratory) as well as intra-laboratory performance—and were compared to the results of the previous proficiency test run GSR2003 ( 1 ). The comparison shows that there is a noticeable improvement in the method's detection capability. 相似文献
605.
606.
607.
Richard Berk Lawrence Brown Andreas Buja Edward George Linda Zhao 《Journal of Quantitative Criminology》2018,34(3):633-655
Objectives
Conventional statistical modeling in criminology assumes proper model specification. Very strong and unrebutted criticisms have existed for decades. Some respond that although the criticisms are correct, there is for observational data no alternative. In this paper, we provide an alternative.Methods
We draw on work in econometrics and statistics from several decades ago, updated with the most recent thinking to provide a way to properly work with misspecified models.Results
We show how asymptotically, unbiased regression estimates can be obtained along with valid standard errors. Conventional statistical inference can follow.Conclusions
If one is prepared to work with explicit approximations of a “true” model, defensible analyses can be obtained. The alternative is working with models about which all of the usual criticisms hold.608.
609.
610.
Motivated by the links between terror and crime and the difficulty in directly detecting terror activity, this article formulates and solves a resource allocation problem on overlapping networks to determine if interdiction efforts may be able to take advantage of these connections. The government, knowing only the general structure and overlap of the networks, allocates its scarce resources to investigate each terror and criminal network. There are two stages to the investigation: an initial investigation of all nodes (i.e., terrorists or criminals) and a secondary investigation of criminals identified during the initial investigation to determine if they are terrorists. Applying the model to data derived from a population of terrorists in the United States between 1971–2003 suggests that the government may be able to exploit the terror connections of crimes that are relatively uncommon, somewhat easy to detect, and are attractive to terrorists. 相似文献