首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   359篇
  免费   7篇
各国政治   7篇
工人农民   40篇
世界政治   32篇
外交国际关系   20篇
法律   186篇
中国政治   3篇
政治理论   67篇
综合类   11篇
  2022年   2篇
  2021年   2篇
  2020年   13篇
  2019年   10篇
  2018年   19篇
  2017年   12篇
  2016年   13篇
  2015年   7篇
  2014年   13篇
  2013年   57篇
  2012年   14篇
  2011年   9篇
  2010年   6篇
  2009年   14篇
  2008年   12篇
  2007年   14篇
  2006年   14篇
  2005年   10篇
  2004年   10篇
  2003年   11篇
  2002年   18篇
  2001年   7篇
  2000年   6篇
  1999年   7篇
  1998年   7篇
  1997年   7篇
  1996年   1篇
  1995年   7篇
  1994年   5篇
  1993年   3篇
  1992年   5篇
  1990年   6篇
  1989年   4篇
  1988年   2篇
  1987年   5篇
  1986年   3篇
  1985年   3篇
  1983年   1篇
  1982年   2篇
  1979年   1篇
  1975年   1篇
  1973年   2篇
  1966年   1篇
排序方式: 共有366条查询结果,搜索用时 15 毫秒
301.
Subadult age estimation should rely on sampling and statistical protocols capturing development variability for more accurate age estimates. In this perspective, measurements were taken on the fifth lumbar vertebrae and/or clavicles of 534 French males and females aged 0–19 years and the ilia of 244 males and females aged 0–12 years. These variables were fitted in nonparametric multivariate adaptive regression splines (MARS) models with 95% prediction intervals (PIs) of age. The models were tested on two independent samples from Marseille and the Luis Lopes reference collection from Lisbon. Models using ilium width and module, maximum clavicle length, and lateral vertebral body heights were more than 92% accurate. Precision was lower for postpubertal individuals. Integrating punctual nonlinearities of the relationship between age and the variables and dynamic prediction intervals incorporated the normal increase in interindividual growth variability (heteroscedasticity of variance) with age for more biologically accurate predictions.  相似文献   
302.
In New York, hearsay statements made by children may be admissible in a child protective proceeding. Under Article 10 of the Family Court Act, an out‐of‐court statement only requires corroboration to support the statement's reliability. The Family Court has the choice to determine what evidence will be sufficient for corroboration. In comparison to other statutes from different states, New York's statute is very broad. This Note proposes amending the current evidence statute under Article 10 of the Family Court Act to strengthen the standard for admitting hearsay statements in child protective proceedings.  相似文献   
303.
This article aims to contribute to literature on the conceptualisation of ‘vulnerability’ and its use by neo-liberal welfare regimes to demean, stigmatize and responsibilize welfare recipients. Several conceptions of ‘vulnerability’ will be explored and utilised in the context of welfare reforms that purport to regulate social security recipients as highly risky ‘vulnerable’ subjects. However, as this article will make clear, ‘vulnerability’ is a somewhat slippery concept and one susceptible to abuse by powerful interests intent on increasing coercive surveillance, discipline and disentitlement for those designated as ‘vulnerable’. Legislation enacted ostensibly to address the ‘vulnerability’ of welfare recipients can foster intensive regulation and it must be asked who benefits most from such arrangements and the rhetoric that supports them.  相似文献   
304.
This article critically examines a poorly understood aspect of the European security landscape: early warning systems (EWSs). EWSs are socio-technical systems designed to detect, analyse, and disseminate knowledge on potential security issues in a wide variety of sectors. We first present an empirical overview of more than 80 EWS in the European Union. We then draw on debates in Critical Security Studies to help us make sense of the role of such systems, tapping into conceptual debates on the construction of security issues as either “threat” or “risk” related. Finally, we study one EWS – the Early Warning and Response System for infectious diseases – to understand how it works and how it reconciles risk – versus threat-based security logics. Contrary to assumptions of a clear distinction between risk- and threat-based logics of security, we show that EWSs may serve as a “transmission belt” for the movement of issues from risk into threats.  相似文献   
305.
306.
307.
This paper examines land grabbing in Bangladesh and views such seizures through the lens of displacement and land encroachment. Two different but potentially interacting displacement processes are examined. The first, the char riverine and coastal sediment regions that are in a constant state of formation and erosion, are contested sites ripe for power plays that uproot small producers on their rich alluvial soils. The second examines new patterns of land capture by elites who engage gangs, corrupted public servants and the military to coerce small producers into relinquishing titles to their ever more valuable lands in and near urban areas. These historically specific and contingent land grabs draw attention to in situ displacement, where people may remain in place or experience a prolonged multi-stage process of removal. This contrasts with ex situ displacement, a decisive expulsion of people from their homes, communities and livelihoods. In both the char and peri-urban case, we signal new forms of collective action in response to involuntary alienation of land resources in a rapidly and violently transforming political economy. We conclude with a caution against naturalizing displacement, casting it as an ‘inevitable’ consequence of changing weather conditions in the former and population dynamics in the latter.  相似文献   
308.
The Victorian state government has required local governments to publish their corporate plans and this paper explores the information provided by their corporate plans. These plans demonstrate diversity in the form and content, but several themes emerge. First, despite the purpose of corporate plans being to demonstrate accountability to the local community, the lack of performance targets reduces the usefulness of these plans for accountability purposes. It also explores objectives which are of major importance to the sector, such as local economic development, which is an issue difficult to control in the local area, being largely determined by federal and state policy. Other important objectives include financial and asset management together with emphases on the local community and accountability, issues which were the drivers of the state government's reform agenda. This article assists those who want to enhance the practice of corporate (strategic) planning in local government.  相似文献   
309.
This article considers the specific mode of visualization that is at work in contemporary border security practices. Taking inspiration from art historian Jonathan Crary's genealogies of attention, it situates homeland security visuality in a particular economy of attention or attentiveness to the world. How is it that we come to focus on some elements of our way of life, establish them as normal and designate deviations from the norm? How does this algorithmic attentiveness break up the visual field, ‘pixelating’ sensory data so that it can be reintegrated to project a picture of a person? The pre-emptive lines of sight emerging in contemporary security practice become precisely a means of visualizing unknown futures. The article concludes with reflections on the creative artistic forms of attention that flourish even where the lines of sight of the consumer, the citizen, the border guard, the traveller, the migrant appear ever more directed and delimited. It is in these more creative modes of attention that we find one of the most important resources to contemporary political life – the capacity to question the ‘better picture’, to disrupt what we see as ordinary or out of the ordinary and confront the routines of our lives anew.  相似文献   
310.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号