首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   416篇
  免费   13篇
各国政治   16篇
工人农民   36篇
世界政治   29篇
外交国际关系   21篇
法律   216篇
中国政治   7篇
政治理论   101篇
综合类   3篇
  2023年   4篇
  2022年   3篇
  2020年   7篇
  2019年   4篇
  2018年   13篇
  2017年   12篇
  2016年   8篇
  2015年   11篇
  2014年   5篇
  2013年   54篇
  2012年   10篇
  2011年   12篇
  2010年   13篇
  2009年   8篇
  2008年   21篇
  2007年   12篇
  2006年   12篇
  2005年   18篇
  2004年   7篇
  2003年   9篇
  2002年   9篇
  2001年   9篇
  2000年   13篇
  1999年   5篇
  1998年   12篇
  1997年   9篇
  1996年   4篇
  1995年   5篇
  1994年   4篇
  1993年   7篇
  1992年   7篇
  1991年   6篇
  1990年   8篇
  1989年   3篇
  1988年   5篇
  1987年   6篇
  1986年   7篇
  1985年   11篇
  1984年   3篇
  1983年   3篇
  1982年   9篇
  1981年   6篇
  1976年   5篇
  1975年   3篇
  1973年   4篇
  1971年   4篇
  1970年   2篇
  1969年   2篇
  1968年   3篇
  1966年   2篇
排序方式: 共有429条查询结果,搜索用时 125 毫秒
261.
262.
Measuring trajectory angles of bullet defects at a crime scene is an important part of crime scene investigation as these angles can be used for shooting incident reconstructions. The Washington State Patrol Crime Scene Response Team (WSP CSRT) had a desire to report and use measured trajectory angles. To report quantitative measurements, a statement of uncertainty for the measurement must also be reported due to an accreditation requirement through the ANSI National Accreditation Board (ANAB), through which the WSP CSRT is accredited. This evaluation examined the measurement uncertainty of the 3D laser scanning method that the WSP CSRT utilizes for measuring the vertical and azimuth angles from trajectory rods fitted to bullet defects. Three studies were performed which examined the variation of vertical and azimuth angle measurements from trajectory rods on flat surfaces, the variation of azimuth angle measurements from a trajectory rod on a curved surface, and a traceability study with known vertical and azimuth angle measurements. Seven common substrates were selected as target materials and were shot with 9 mm Luger and 0.45 Auto caliber bullets. A vehicle with one bullet defect was utilized for the curved surface study. The WSP's current fleet of Trimble X7 3D laser scanners, the WSP Criminal Investigation Division (CID) Detectives who operate these scanners, and the Forensic Scientists responsible for trajectory rod placement and angle measurements were utilized. An overall measurement uncertainty of +/− 2.6 degrees at an approximate 95% confidence interval was determined for all trajectory angles measured from trajectory rods.  相似文献   
263.
The Internet has become the site of economically relevant objects, events and actions, as well as the source of potential risks to the financial systems. This article builds on a metaphor of ‘border problems’ in financial regulation, exploring a ‘third border’ between the ‘real world’ and ‘cyberspace’—a virtual domain of human interaction facilitated and conditioned by digital communications systems. Reviewing the ‘cyber-sovereignty’ debate and surveying the divergent approaches now emerging along geo-political faultlines, we argue that sovereign states still have a unique and irreplaceable role in guarding financial stability which must be reflected in the law of Internet jurisdiction: an emerging lex cryptographica financiera. We conclude with a few observations on how this could affect the design of financial regulation in the coming decade.  相似文献   
264.
Educational outcomes assessment can improve public service education programs. This article applies the Model of Learning Outcomes for Public Service Education which suggest that enabling characteristics—factors that mediate the relationship among immediate, intermediate, and longer term outcomes—can improve our understanding of public service education. A survey was conducted of alumni at The George Washington University in Washington, DC, and the American University in Cairo in Cairo, Egypt. The responses from the two groups of MPA program alumni were striking: curriculum understanding and application were markedly similar, suggesting that this model is appropriate for use in different contexts.  相似文献   
265.
Abstract

Although there has been a great deal of research conducted on sexual offenders in recent years, the vast majority of studies have focused on male perpetrators. Little is known about female sexual perpetrators, due primarily to the small number of offenders/offences and sociocultural factors. This study evaluated if there was an association between static risk factors [as delineated by the Static-99 and Rapid Risk Assessment for Sex Offender Recidivism (RRASOR)] and institutional sexual misconduct for incarcerated female sexual offenders. In addition to demographic information, total Static scores were obtained from a file review along with institutional conduct reports. The STATIC-99 and RRASOR scores from intake information significantly predicted sexual conduct reports in prison.  相似文献   
266.
College and alcohol are a potent mix. This paper reviews what is known and unknown about college students’ involvement in alcohol-related crime as both offenders and victims. There are three types of alcohol-related crime: psychopharmacological; economic compulsive; and systemic. Research on college students, however, has focused entirely on the first type. Why are the latter two types untouched in the literature? After reviewing research on alcohol-involved psychopharmacological crime among college students, we address this question by drawing on Lewis & Lewis’ taxonomy of ‘negative evidence.’ We outline and assess reasons for the dearth of information on these topics, and draw on these explanations to suggest fruitful areas for future research.  相似文献   
267.
There are few histologic studies of intracoronary stents found at autopsy. We studied histologic findings of 87 intracoronary stents from 45 autopsy hearts. There were 40 patients with chronically implanted stents and five shorter than 30 days. Of five patients with recent stent placement, the cause of death was related to the stent (in‐stent thrombosis) in one case. Of the 40 patients with chronic stents, there were 16 sudden coronary deaths and 24 noncoronary deaths (controls). There were no late stent thromboses in the coronary deaths. In the coronary deaths, 26% of stents showed restenosis versus 11% in controls (p = 0.1). The rate of healed infarcts and cardiomegaly was similar in the coronary and noncoronary groups, and acute thrombi in native arteries were seen only in three hearts in the coronary group. We conclude that the cause of death is rarely impacted by in‐stent findings at autopsy, especially in chronically implanted stents.  相似文献   
268.
Information warfare represents a threat to American national security and defense. There are two general methods in which a terrorist might employ an information terrorist attack: (1) when information technology (IT) is a target, and/or (2) when IT is the tool of a larger operation. The first method would target an information system for sabotage, either electronic or physical, thus destroying or disrupting the information system itself and any information infrastructure (e.g., power, communications, etc.) dependent upon it. The second would manipulate and exploit an information system, altering or stealing data, or forcing the system to perform a function for which it was not meant (such as spoofing air traffic control). A perennial dilemma of combating terrorism in a democratic society is finding the right balance between civil liberties and civil security. The special problems associated with IT are examined. The US national security establishment needs to use a flexible, integrated response to counter information terrorists ‐ one which employs information warfare tactics tailored to counter gray‐area phenomena, but which also pools resources from ‘conventional’ counter‐terrorism and law enforcement authorities.  相似文献   
269.
This article discusses the British political system's reliance on party manifestos and suggests that they deserve study as rhetorical texts. The magazine-like 1997 manifestos of the Conservative, Labour, and Liberal Democrat Parties are analyzed with respect to their iconic structure, the priority of policy domains in their social critiques, their historical narratives, and their narratives on the central issue of economics. Results suggest that all three parties focused on British history since 1979 and on economic issues. The Conservative Manifesto subordinated people to icons and graphs, concentrated on economic analyses, and portrayed the party's policies as successful. Labour and Liberal Democrats emphasized economic failures; the Liberal Democrats sought wide-ranging populist reforms, while "New" Labour ran against the Tory record and the historic radicalism of "Old" Labour.  相似文献   
270.
Recent work has begun exploring the effects of foreign military deployments on host-state foreign policies. However, research mostly focuses on dyadic relationships between major powers and host-states, ignoring the broader regional security environment of host-states. We develop a theory of spatial hierarchies to understand how security relationships throughout the region surrounding the host-state affect host-state foreign policy. Using data on US military deployments from 1950–2005, we show that regional security considerations condition how host-states respond to the deployment of military forces to their territory. Consequently, regional analyses are fundamental in understanding monadic and dyadic decisions about security, alliance behavior, and conflict.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号