首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   99篇
  免费   1篇
各国政治   5篇
工人农民   3篇
世界政治   1篇
法律   88篇
政治理论   2篇
综合类   1篇
  2024年   10篇
  2023年   44篇
  2021年   10篇
  2020年   3篇
  2019年   1篇
  2018年   1篇
  2017年   1篇
  2016年   1篇
  2013年   3篇
  2012年   2篇
  2011年   3篇
  2010年   1篇
  2009年   1篇
  2008年   4篇
  2007年   2篇
  2006年   5篇
  2005年   2篇
  2003年   1篇
  1999年   1篇
  1998年   1篇
  1995年   1篇
  1994年   1篇
  1988年   1篇
排序方式: 共有100条查询结果,搜索用时 0 毫秒
21.
    
Nearly a decade ago, fentanyl reappeared in the United States illicit drug market. In the years since, overdose deaths have continued to rise as well as the amount of fentanyl seized by law enforcement agencies. Research surrounding fentanyl production has been beneficial to regulatory actions and understanding illicit fentanyl production. In 2017, the Drug Enforcement Administration (DEA) began collecting seized fentanyl samples from throughout the United States to track purity, adulteration trends, and synthetic impurity profiles for intelligence purposes. The appearance of a specific organic impurity, phenethyl-4-anilino-N-phenethylpiperidine (phenethyl-4-ANPP) indicates a shift in fentanyl production from the traditional Siegfried and Janssen routes to the Gupta-patent route. Through a collaboration between the DEA and the US Army's Combat Capabilities Development Command Chemical Biological Center (DEVCOM CBC), the synthesis of fentanyl was investigated via six synthetic routes, and the impurity profiles were compared to those of seized samples. The synthetic impurity phenethyl-4-ANPP was reliably observed in the Gupta-patent route published in 2013, and its structure was confirmed through isolation and structure elucidation. Organic impurity profiling results for illicit fentanyl samples seized in late 2021 have indicated yet another change in processing with the appearance of the impurity ethyl-4-anilino-N-phenethylpiperidine (ethyl-4-ANPP). Through altering reagents traditionally used in the Gupta-patent route, the formation of this impurity was determined to occur through a modification of the route as originally described in the Gupta patent.  相似文献   
22.
Matching dental antemortem (AM) and postmortem (PM) data for human identification is especially challenging when the workforce is limited. Dental hygienists have served mass fatality incidents (MFIs) due to dental-related expertise. However, forensics within dental hygiene education and research on transferable skills is limited. This qualitative balance design study assessed senior dental hygiene students' match accuracy of simulated cases varying in dental identifiers based on AM full mouth series (FMS) radiographs and oral photographs to PM WinID3® odontograms to demonstrate possible disaster victim identification (DVI) transferable skills gained during formal education. A convenience sample of senior dental hygiene students (n = 31) was presented information on WinID3® interpretation, then presented with 5 mismatched cases and asked to visually interpret each to make 10 total matches; five based on AM FMS with simulated PM WinID3® odontograms and five based on AM photographs with PM WinID3® odontograms. Match accuracy scores ranged from 41.9% to 58.1% for cases with 1–10 identifiers, and 77.4% to 93.5% for cases with 11–40 identifiers. Accuracy when matching AM radiographs to PM odontograms versus AM photographs to PM odontograms was compared and revealed no statistical differences in match accuracy depending on image type (p = 0.388 to 1.000). Results of this pilot study suggests transferable match accuracy skills resulted from the participants' dental hygiene formal education. These baseline skills with additional specialized training support the rationale for dental hygienists serving on DVI teams. More research is needed in education and practice when preparing dental hygienists for forensic-based service.  相似文献   
23.
    
The secondary dentin deposition that occurs after the tooth formation process results in a decrease in pulp cavity volume in adolescents and adults. The purpose of this critical review was to correlate pulpal and/or dental volume on cone-beam computed tomography (CBCT) with chronological age approximation. A subobjective was to investigate which methodology and CBCT technical parameters would be most appropriate to evaluate this correlation. This critical review followed the PRISMA guidelines, and it was conducted by a search through PubMed, Embase, SciELO, Scopus, Web of Science, Cochrane Library databases, as well as gray literature. Primary studies that used pulp volume, or pulp chamber to tooth volume ratio measured using CBCT were included. Seven hundred and eight indexed and 31 non-indexed records were identified. A qualitative analysis was performed including 25 selected studies with a total of 5100 individuals, age ranging from 8 to 87 years without sex predilection. The most used method was pulp volume/tooth volume. CBCT voxel size ranged between 0.09 and 0.5. Manual segmentation associated with threshold algorithms was used in most of the studies. Correlation between the pulp volume/tooth volume ratio was moderate: −0.66 for the upper central incisors, −0.59 for upper canines and −0.56 for lower canines. High heterogeneity was observed among the studies. It is concluded that pulp volume should be used with caution in age estimation. Evidence supports the preferable use of upper incisors with pulp volume/tooth volume ratio for age estimation. There is not enough evidence that voxel size interferes in age estimation by pulp volume.  相似文献   
24.
    
Deaths occurring due to rattlesnake envenomization are extremely rare and must be thoroughly investigated in the same manner as any other type of death. Our research presents the case of an adult white male who suffered a fatal timber rattlesnake (Crotalus horridus) envenomation in northwest Florida in 2018. Blood samples were taken from the decedent's heart and vasculature of the chest and sent for serum proteomic analysis. Serum proteomic analysis was utilized in order to identify proteins from timber rattlesnake (C. horridus) found within the victim's blood. The confirmation of the presence of timber rattlesnake venom within the victim's blood allows the forensic pathologist to determine the cause of death most accurately and likewise, assists with the manner of death determination. Blood samples were separated into two groups: one with the abundant endogenous proteins depleted to facilitate detection of lower abundant proteins and one undepleted. In the depleted sample, a total of 712 proteins were identified, with 47 of the proteins (6.6%) occurring originating from timber rattlesnake (C. horridus). Likewise, a total of 742 proteins were identified in the undepleted sample, with 52 of the proteins (7.0%) occurring in timber rattlesnake (C. horridus). No timber rattlesnake (C. horridus) proteins were found in control human serum.  相似文献   
25.
    
Anti-forensic technology can play an effective role in protecting information, but it can make forensic investigations difficult. Specifically, file-wiping permanently erases evidence, making it challenging for investigators to determine whether a file ever existed and prolonging the investigation process. To address this issue, forensic researchers have studied anti-forensic techniques that detect file-wiping activities. Many previous studies have focused on the effects of file-wiping tools on $MFT, $LogFile, and $DATA, rather than on Windows artifacts. Additionally, previous studies that have examined Windows artifacts have considered different artifacts, making it difficult to study them in a comprehensive manner. To address this, we focused on analyzing traces in 13 Windows artifacts of 10 file-wiping tools' operations in the Windows operating system comprehensively. For our experiments, we installed each file-wiping tool on separate virtual machines and checked the traces that the tools left behind in each artifact. We then organized the results in a database format. Our analysis revealed that most of the tools left traces on other artifacts, except for JumpList, Open&SavePidlMRU, and lnk. There were also some cases where traces remained on the other three artifacts. Based on our research, forensic investigators can quickly identify whether a file-wiping tool has been used, and it can assist in decision-making for evidence collection and forensic triage.  相似文献   
26.
    
While canines are most commonly trained to detect traditional explosives, such as nitroaromatics and smokeless powders, homemade explosives (HMEs), such as fuel–oxidizer mixtures, are arguably a greater threat. As such, it is imperative that canines are sufficiently trained in the detection of such HMEs. The training aid delivery device (TADD) is a primary containment device that has been used to house HMEs and HME components for canine detection training purposes. This research assesses the odor release from HME components, ammonium nitrate (AN), urea nitrate (UN), and potassium chlorate (PC), housed in TADDs. Canine odor recognition tests (ORTs) were used with analytical data to determine the detectability of TADDs containing AN, UN, or PC. Headspace analysis by gas chromatography/mass spectrometry (GC/MS) with solid-phase microextraction (SPME) or online cryotrapping were used to measure ammonia or chlorine, as well as other unwanted odorants, emanating from bulk AN, UN, and PC in TADDs over 28 weeks. The analytical data showed variation in the amount of ammonia and chlorine over time, with ammonia from AN and UN decreasing slowly over time and the abundance of chlorine from PC TADDs dependent on the frequency of exposure to ambient air. Even with these variations in odor abundance, canines previously trained to detect bulk explosive HME components were able to detect all three targets in glass and plastic TADDs for at least 18 months after loading. Detection proficiency ranged from 64% to 100% and was not found to be dependent on either age of material.  相似文献   
27.
    
This work presents a data survey regarding the qualitative chemical analysis of drugs seized by the Police in the state of Minas Gerais between July 2017 and June 2022, including an evaluation of labeling of 265 samples of anabolic androgenic steroids (AAS) seized in 2020. The Active Pharmaceutical Ingredients (API) present in the samples were identified through chemical analysis and classified by system Anatomical Therapeutic Chemical (ATC) methods. Analysis of the labeling information for 265 samples of AAS followed the guidance of legislation RDC 71 (2009) from ANVISA. For this study 6355 seized pharmaceuticals underwent qualitative chemical analysis that corresponded to 7739 APIs successfully identified and classified. Among the components studied AAS, psychostimulants, anesthetics, and analgesics were the most commonly examined. AAS seized and tested increased by over 100% and for the majority of the samples analyzed were found to not match the labeling on the packaging. In the meantime, anti-obesity drugs presented a prominent increase of 400% from 2020/1 to 2021/2, during covid-19 quarantine. Seized pharmaceuticals and tests can support information in the planning of public health and safety policies.  相似文献   
28.
    
The storage and use of explosives is regulated at the state and federal level, with a particular focus on physical security and rigorous accounting of the explosive inventory. For those working with explosives for the training and testing of explosive-detecting canines, cross-contamination is an important concern. Hence, explosives intended for use with canine teams must be placed into secondary storage containers that are new, clean, and airtight. A variety of containers meet these requirements and include screw-top glass jars (e.g., mason jars). However, an additional need from the explosive-detecting canine community is secondary containers that can also be used as training aids whereby the volatiles emitted by explosives are emitted in a predictable and stable manner. Currently, a generally accepted method for the storage of explosives and controlled emission of explosive vapor for canine detection does not exist. Ideally, such containers should allow odor to escape from the training aid but block external contaminates such as particulates or other volatiles. One method in use places the explosive inside a permeable cotton bag when in use for training and then stores the cotton bag inside an impermeable nylon bag for long-term storage. This paper describes the testing of an odor permeable membrane device (OPMD) as a new way to store and deploy training aids. We measured the evaporation rate and flux of various liquid explosives and volatile compounds that have been identified in the headspace of actual explosives. OPMDs were used in addition to traditional storage containers to monitor the contamination and degradation of 14 explosives used as canine training aids. Explosives were stored individually using traditional storage bags or inside an OPMD at two locations, one of which actively used the training aids. Samples from each storage type at both locations were collected at 0, 3, 6, and 9 months and analyzed using Fourier Transform Infrared (FTIR) Spectroscopy and Gas Chromatography–Mass Spectrometry (GC–MS) with Solid-Phase Microextraction (SPME). FTIR analyses showed no signs of degradation. GC–MS identified cross-contamination from ethylene glycol dinitrate (EGDN) and/or 2,3-dimethyl-2,3-dinitrobutane (DMNB) across almost all samples regardless of storage condition. The contamination was found to be higher among training aids that were stored in traditional ways and that were in active use by canine teams.  相似文献   
29.
    
Human hairs are one of the most commonly encountered items of trace evidence. Currently, conventional methods for hair analysis include microscopic comparison and DNA analysis (nuclear and mitochondrial). Each approach has its own drawbacks. Hair proteins are stable and offer an alternative to DNA testing, as demonstrated with proteomics for distinguishing humans. However, proteomics is complicated and requires identifying peptides to remain intact following harsh sample preparation methods. Alternatively, the actual amino acid content of a hair sample may also offer important identifying information and actually requires proteins and peptides to be broken down completely rather than remaining intact. This study evaluated the discriminating power of using hair amino acid ratios to differentiate hair samples from 10 unrelated individuals with dark colored hair. Hair proteins were digested, derivatized, and analyzed using gas chromatography–mass spectrometry. Amino acid ratios were calculated for each individual and comparisons using ANOVA and post-hoc pairwise t-test with Bonferroni correction were made with amino acid ratios for individuals. Overall, out of the 45 possible pairwise comparisons between all hair samples, 38 (84%) were differentiable. Out of the 36 possible pairwise comparisons between brown haired individuals, 32 (89%) were considered differentiable using univariate statistics. Multivariate statistics were also attempted but, overall, univariate models were sufficient for exclusionary purposes. These results indicate that amino acid ratio analysis can potentially be used as an exclusionary method using hair if DNA analysis cannot be performed, or to corroborate conclusions made following microscopic analysis.  相似文献   
30.
    
This study explored digital dynamic signatures containing quantifiable dynamic data. The change in data content and nature necessitates the development of new data treatment approaches. A SignPad Omega digitizing tablet was used to assess measurement reproducibility, as well as within‐writer variation and the occurrence of correctly simulated features. Measurement reproducibility was found to be high except for pressure information. Within‐writer variation was found to be higher between days than on a same day. Occurrence of correct simulation was low for features such as signature size, trajectory length, and total signature time. Feature discrimination factors combining within‐writer variability and the occurrence of correctly simulated features were computed and show that signature size, trajectory length, and signature time are the features that perform the best for discriminating genuine from simulated signatures. A final experiment indicates that dynamic information can be used to create connections between simulation cases.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号