首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   119篇
  免费   9篇
各国政治   30篇
工人农民   4篇
世界政治   22篇
外交国际关系   7篇
法律   40篇
中国共产党   1篇
中国政治   1篇
政治理论   21篇
综合类   2篇
  2023年   1篇
  2022年   1篇
  2021年   6篇
  2020年   5篇
  2019年   7篇
  2018年   5篇
  2017年   3篇
  2016年   8篇
  2015年   5篇
  2014年   3篇
  2013年   24篇
  2012年   6篇
  2011年   4篇
  2010年   3篇
  2009年   1篇
  2008年   2篇
  2007年   3篇
  2006年   5篇
  2005年   2篇
  2004年   3篇
  2003年   2篇
  2002年   1篇
  2001年   2篇
  2000年   2篇
  1999年   1篇
  1998年   4篇
  1996年   1篇
  1995年   2篇
  1993年   2篇
  1992年   3篇
  1991年   4篇
  1990年   1篇
  1989年   1篇
  1981年   1篇
  1979年   1篇
  1967年   3篇
排序方式: 共有128条查询结果,搜索用时 0 毫秒
31.
There are comparative analyses in the current criminal justice literature but few focus on Asian cultures and even fewer compare Muslim countries with the United States. While comprehensive comparative studies are needed, preliminary studies that correlate the functional similarities and differences are also necessary. Hence, the purpose of this paper is to conduct a comparative analysis of the jails in Bangladesh and the United States. The data for this study are taken directly from Bangladesh population summary reports and a matched sample of American Jails from the Bureau of Justice Statistics Jail Census (1990). The comparative data are key functional measures from each country and are used as the basis for classifying the jails into two groups. The findings indicate that there are key differentiating variables (crowding and population turnover) that allow one to classify the jails in the two nations. Although this study provides clear evidence for the differences between American and Bangladeshi jails, further in‐depth analyses should follow.  相似文献   
32.
33.
This paper argues that corruption protection arises because a central feature of Iraq’s institutional environment is its factionalised political system between groups (i.e. sectarian affiliation), and these groups both protect their members from corruption charges launched by other groups, and collude to protect each other from prosecution of corruption. The paper defines corruption protection as ‘action carried out to prevent perpetrators of corruption from being brought to justice’, which is a systematic attempt among corrupt agents seeking to evade accountability for primary corruption activity. The paper has identified two contrasting paths taken by these groups in power in the dynamics of corruption protection: (a) The competitive mode is illustrated by spurious allegations of corruption made by some groups against other groups. Tension between factions results in fake charges being brought against rivals which sometimes lead to wrongful imprisonment of the innocent; (b) collusive between intra-factional groups, corruptly conspiring to hide each other’s corrupt acts thereby constructing a shield which protects the entire elite in Iraq, an issue which I label ‘solidarity in corruption’. The paper will conclude that despite the apparent strength of anti-corruption framework, the reality tells us a very different story; the multiple institutions established to fight corruption and the system of accountability can also constitute a means for corruption protection.  相似文献   
34.
Water shortages are a global problem; the world is moving fast toward a fresh-water crisis. Water resources are unevenly and irregularly distributed, and the Middle East is one of the driest regions in the world. Three-quarters of its land mass is arid, and most water resources originate outside the region. Continuing current practices will plunge the region deeper into crisis, creating conditions where conflicts and wars over scarce resources at local or national levels become inevitable.  相似文献   
35.
Studies show that there are many benefits of using Web 2.0 and social media in governments. However, the factors influencing government employees‘ adoption of these technologies are not well known. In this paper, the Unified Theory of Acceptance and Use of Technology (UTAUT) was integrated with two constructs, namely, perceived confidentiality risks (PCR) and attitude (AT) in order to investigate the factors influencing adoption of these technologies among government employees. The sample consisted of 600 usable responses collected from Tanzania Government Employees. To analyze the data, Structural Equation Modeling was used. Both PCR and AT were found to be influential.  相似文献   
36.
37.
38.
Allele frequencies for 10 STRs including the GenePrint PowerPlex 1.2 loci and also D3S1358, HumvWA and HumFGA were obtained from a sample of unrelated individuals from El-Minia City.  相似文献   
39.
40.
The aims of this study were to determine if computer‐measured dynamic features (duration, size, velocity, jerk, and pen pressure) differ between genuine and simulated signatures. Sixty subjects (3 equal groups of 3 signature styles) each provided 10 naturally written (genuine) signatures. Each of these subjects then provided 15 simulations of each of three model signatures. The genuine (N = 600) and simulated (N = 2700) signatures were collected using a digitizing tablet. MovAlyzeR® software was used to estimate kinematic parameters for each pen stroke. Stroke duration, velocity, and pen pressure were found to discriminate between genuine and simulated signatures regardless of the simulator's own style of signature or the style of signature being simulated. However, there was a significant interaction between style and condition for size and jerk (a measure of smoothness). The results of this study, based on quantitative analysis and dynamic handwriting features, indicate that the style of the simulator's own signature and the style of signature being simulated can impact the characteristics of handwriting movements for simulations. Writer style characteristics might therefore need to be taken into consideration as potentially significant when evaluating signature features with a view to forming opinions regarding authenticity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号