全文获取类型
收费全文 | 139篇 |
免费 | 4篇 |
专业分类
各国政治 | 2篇 |
工人农民 | 10篇 |
世界政治 | 14篇 |
外交国际关系 | 2篇 |
法律 | 98篇 |
政治理论 | 17篇 |
出版年
2020年 | 2篇 |
2018年 | 3篇 |
2017年 | 3篇 |
2016年 | 2篇 |
2015年 | 4篇 |
2014年 | 6篇 |
2013年 | 8篇 |
2012年 | 3篇 |
2011年 | 4篇 |
2010年 | 9篇 |
2009年 | 6篇 |
2008年 | 11篇 |
2007年 | 3篇 |
2006年 | 2篇 |
2005年 | 3篇 |
2004年 | 4篇 |
2003年 | 2篇 |
2002年 | 3篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 3篇 |
1987年 | 4篇 |
1986年 | 3篇 |
1985年 | 3篇 |
1984年 | 4篇 |
1983年 | 3篇 |
1982年 | 1篇 |
1980年 | 3篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1977年 | 4篇 |
1976年 | 3篇 |
1975年 | 4篇 |
1974年 | 2篇 |
1973年 | 2篇 |
1972年 | 4篇 |
1971年 | 3篇 |
1970年 | 1篇 |
1967年 | 1篇 |
1966年 | 2篇 |
1965年 | 1篇 |
1961年 | 1篇 |
排序方式: 共有143条查询结果,搜索用时 15 毫秒
101.
Shane D. Johnson Wim Bernasco Kate J. Bowers Henk Elffers Jerry Ratcliffe George Rengert Michael Townsley 《Journal of Quantitative Criminology》2007,23(3):201-219
Using epidemiological techniques for testing disease contagion, it has recently been found that in the wake of a residential
burglary, the risk to nearby homes is temporarily elevated. This paper demonstrates the ubiquity of this phenomenon by analyzing
space–time patterns of burglary in 10 areas, located in five different countries. While the precise patterns vary, for all
areas, houses within 200 m of a burgled home were at an elevated risk of burglary for a period of at least two weeks. For
three of the five countries, differences in these patterns may partly be explained by simple differences in target density.
The findings inform theories of crime concentration and offender targeting strategies, and have implications for crime forecasting
and crime reduction more generally.
相似文献
Shane D. JohnsonEmail: |
102.
The physical comparison of known (K) and questioned (Q) evidence samples is an accepted tool in numerous forensic identification disciplines (1). A subset of this process is the use of antemortem and postmortem dental radiographs to identify unidentified human remains. This method has been generally accepted for decades (2). The outcome is performed with a considerable degree of accuracy, due in part to a finite pool of possible candidates for identification derived via the NCIC database, passenger lists, and law enforcement Missing Persons reports. This paper describes a dental identification comparison protocol that incorporated digital imaging technology in this process. The computer was used to create digital exemplars of the K and Q evidence that were spatially and quantitatively compared (3). The digital mode allowed direct metric and morphologic comparison through the aid of a digital camera, desktop computer, monitor, and printer. The well-known computer program Adobe Photoshop 5.0 (4) was used to process the digital information in two forensic cases described in this paper. It is a commercially available digital imaging editing program that is operated on laptop and desktop computers possessing sufficient chip speed and RAM (Pentium II or equivalent and at least 76MB RAM) to open the large-size files generated by high-resolution digital capture devices. This program accepts raster-based image formats (e.g. .JPG, .BMP). Photoshop is noted for its diverse imaging functions, which allow the computer monitor to be used as a comparison microscope when Q and K sample images are tiled side-by-side and/or superimposed. Two and three-dimensional Q and K evidence samples can be individually digitized and then independently resized to allow two-dimensional comparison. The investigator also has the ability to create magnified images (200% to 300%) when the original digital image has been captured at near photoquality resolution (300 dpi). The visual comparison of physical features on the computer monitor permits a large field of view and robust digital control over image quality. Photographic measurement and enhancement features of Adobe Photoshop mimics and in some circumstances surpasses the historic use of conventional photographic manipulation in forensic casework. This paper presents two cases processed via routine forensic odontology identification protocols. These protocols had minimal results due to limitations described in the case histories. The additional application of digital methods proved useful in the ultimate identification of these human remains. 相似文献
103.
104.
105.
106.
107.
108.
109.
110.