首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   197篇
  免费   10篇
各国政治   4篇
工人农民   22篇
世界政治   17篇
外交国际关系   10篇
法律   121篇
中国政治   1篇
政治理论   28篇
综合类   4篇
  2023年   1篇
  2021年   1篇
  2019年   1篇
  2018年   3篇
  2017年   5篇
  2016年   12篇
  2015年   3篇
  2014年   5篇
  2013年   39篇
  2012年   6篇
  2011年   7篇
  2010年   6篇
  2009年   8篇
  2008年   5篇
  2007年   2篇
  2006年   11篇
  2005年   10篇
  2004年   9篇
  2003年   14篇
  2002年   10篇
  2001年   4篇
  2000年   2篇
  1999年   1篇
  1998年   1篇
  1997年   2篇
  1996年   1篇
  1995年   1篇
  1994年   2篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1990年   2篇
  1989年   1篇
  1988年   1篇
  1987年   4篇
  1985年   5篇
  1984年   2篇
  1983年   5篇
  1982年   1篇
  1980年   4篇
  1979年   2篇
  1978年   1篇
  1976年   3篇
  1972年   1篇
排序方式: 共有207条查询结果,搜索用时 31 毫秒
161.
Traditional methods of cadaver detection in outdoor environments include manual ground search, cadaver dogs, and manned aerial reconnaissance during daylight. These methods have limitations; however, a potential low‐cost alternative may be to employ thermal imaging equipment mounted on an unmanned aerial vehicle (UAV) to detect heat emitted by insect and bacterial activity on the decomposing remains. No studies have addressed the influence of wrappings on detection of maggot mass thermal signatures nor assessed thermal detection of smaller body fragments. We addressed these knowledge gaps by utilizing a two‐phase experimental approach to explore thermal detection of carcasses using UAV‐mounted infrared imaging. In Phase 1, pig body fragments were deposited on the surface or shallow buried. In Phase 2, whole pig carcasses were deposited in four conditions: on the surface uncovered, wrapped in plastic or carpet, or buried. Our results demonstrated that observable heat emissions from remains corresponded to peak insect activity during active decay and could be readily detected in uncovered whole carcasses and fragments. Although plastic and carpet wrappings partly impeded detection of insect heat signatures, these materials were clearly detectable themselves because of their contrast to the background ground surface. Thermal signatures of buried partial remains and disturbed gravesoil were also observed; however, the buried whole carcass transitioned to adipocere prior to the decay stage and without any insect colonization or heat signature. These data can inform operational implementation of this technique to complement existing search strategies to offer a robust, low‐cost alternative for use where scene characteristics allow.  相似文献   
162.
During the details stage of multilateral economic talks, agreements are usually negotiated using a combination of two methods - compromise on individual issues and tit-for-tat exchanges. This article identifies the circumstances in which the the US, EEC and British delegations employed these traditional diplomatic techniques, and assesses the effectiveness of these techniques in forging agreement in the details stage of the Kennedy Round, Providing a detailed account of these talks, the article demonstrates that the negotiating techniques of the American delegation were far more flexible than those of the European and British delegations and that this flexibility was vital to the successful completion of the talks. The article concludes that differences in negotiating technique are best explained by a combination of two factors - the contrasting decision making structures of each negotiating team and the international political context of the negotiations.  相似文献   
163.
164.
The aim of this study was to add to the emerging knowledge about the role of bystanders in cyberbullying. To differentiate online versus offline bystander behaviors, 292 Australian children (mean age = 15.2; female = 54.4%) reviewed hypothetical scenarios experimentally manipulated by bystander sex, relationship to target and perpetrator, and severity of bullying incident. In both environments, bystander helping behaviors were more likely when the target was a close friend, perceived harm to the target was high, and when bystanders were female. Bystanders also reported being less likely to approach teachers or publicly defend targets in online versus offline environments. This suggests programs designed to encourage positive bystander behaviors online can be similar to face-to-face approaches, but they need to recognize some aspects unique to the online environment.  相似文献   
165.
This investigation traces the ontogeny of the use of “I” and how its symbolic use promotes imaginative thinking. Peirce's triadic system is contrasted with Vygotsky's binary system to highlight the import of Thirdness in characterizing the ontogeny of person deictics within conversational roles. Person deictics, such as “I”, are first indexes. Later when their social function/meaning is apprehended, they serve as symbols as well; still later they are used psychologically in self to self monologues, and acquire distinctive interpretants when used unconventionally. Early indexical uses of “I” are non-symbolic – “I” referring to self only absent recognition of conversational roles. “I” is employed symbolically when its referent shifts and when its invariant meaning (speaker) is apprehended. Person deictics enhance the emergence of imagination when the symbolic use transcends their inter-psychological regulation through human to human conversation to their intra-psychological function in self to self discourse. Extension of functional roles (speaker/listener) to dolls/puppets (in representational play scenarios) constitutes an extended use of the symbolic function because inanimates cannot assume conversational roles; and such use triggers the association of different interpretants to the category of deictic use. The symbolic use of “I” as speaker facilitates apprehension of self as object, which is a major determinant of when in ontogeny children extend the use of person deictics from Dynamic to Final interpretants.  相似文献   
166.
Family law     
In response to the Legal Education Training Review (LETR) the professional bodies have revisited the competencies required for legal practice. The SRA has prepared a draft competency statement for day one solicitors which focuses on the “key activities required for effective performance as a solicitor”. The impact of this more comprehensive competency statement on legal education is not yet clear, but one option is that it opens up a route to qualification where competency is achieved in the workplace or other non-academic settings and assessed outside the educational establishments. This article considers how to assess competency in legal education in both educational and work based settings. It charts the development of an outcomes orthodoxy in legal education in England and Wales and in other jurisdictions and draws on research in medical education to identify key principles in the design of an assessment methodology for professional education. The article takes a broad “view from the bridge” and reviews a range of assessment methods already in use in legal education and in other professions such as accountancy, medicine and conservator restorers. It argues that a move to a complex competency orientated training system will require a different approach to both the method of assessment and its programming.  相似文献   
167.
Abstract

In the absence of physical evidence, investigators must often rely on offence behaviours when determining whether several crimes are linked to a common offender. A variety of factors can potentially influence the degree to which accurate linking is possible, including the similarity coefficient used to assess across-crime similarity. The current study examines the performance of two similarity coefficients that have recently been compared to one another, Jaccard's coefficient (J) and the taxonomic similarity index (Δs), using samples of two crime types, serial homicide (N=237) and serial burglary (N=210). In contrast to previous research, the results indicate that Δs does not significantly outperform J with respect to linking accuracy. In addition, both coefficients lead to higher levels of linking accuracy in cases of serial homicide compared to serial burglary. Potential explanations for these findings are presented and their implications are discussed.  相似文献   
168.
Abstract

Summary: This article reports a piece of original research into the links between the trafficking in women and children across the globe and how such trafficking practices have been facilitated by developments in technology and telecommunications. The connections between prostitution in the Mekong Sub-Region, pornography on the Internet, and sex tourism have also been researched, based on the experiences of women and children and the men who exploit them.  相似文献   
169.
This paper focuses on what can be done during emergency and transition periods to promote sustainable peace, in the aftermath of complex political emergencies in Africa, with particular reference to issues of reconciliation and justice. There is no common understanding of the political conditions under which efforts at reconciliation should be minimal in relation to a focus on justice in order to achieve the 'best' peace, or of those where the pursuit of justice should become paramount. There is also not even a common language of what justice and reconciliation mean in the context of post-conflict peace-building. The paper concludes that there is a much greater potential role for outsiders with regard to justice, while reconciliation is considered to be more of an internal affair in which international actors can only be present as supporters of domestic initiatives, and even then with great caution.  相似文献   
170.
With governments around the world needing to attract talented professionals, this exploratory, cross-cultural research analyzes career values of 384 MPA and MPP students at major universities in the capitals of China, Malaysia and the United States. Malaysians and Americans structured 23 goals along dimensions that contrasted sharply to those of the Chinese. Moreover, Malaysians and Americans cared more about self-actualization and less about co-worker comradeship than did the Chinese. All three groups prioritized elements of altruism and affluence. Segmentation analysis uncovered six distinct subgroups (Acheivers, Altruistic Analysts, Administrators, Altruistic Affluents, Acquiescents, and Apathetics) with their distributions varying by country.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号