首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   439篇
  免费   12篇
各国政治   32篇
工人农民   22篇
世界政治   13篇
外交国际关系   6篇
法律   310篇
中国政治   12篇
政治理论   55篇
综合类   1篇
  2024年   39篇
  2023年   152篇
  2022年   1篇
  2021年   36篇
  2020年   8篇
  2019年   5篇
  2018年   1篇
  2017年   7篇
  2016年   8篇
  2015年   6篇
  2014年   9篇
  2013年   38篇
  2012年   14篇
  2011年   13篇
  2010年   15篇
  2009年   14篇
  2008年   10篇
  2007年   6篇
  2006年   12篇
  2005年   3篇
  2004年   7篇
  2003年   4篇
  2001年   3篇
  2000年   3篇
  1999年   1篇
  1998年   2篇
  1997年   2篇
  1995年   4篇
  1994年   2篇
  1993年   2篇
  1992年   1篇
  1991年   4篇
  1989年   6篇
  1985年   1篇
  1984年   4篇
  1983年   2篇
  1982年   2篇
  1981年   1篇
  1980年   1篇
  1966年   2篇
排序方式: 共有451条查询结果,搜索用时 0 毫秒
191.
The automated search software integrated with a scanning electron microscope (SEM/EDS) has been the standard tool for detecting inorganic gunshot residues (iGSR) for several decades. The detection of these particles depends on various factors such as collection, preservation, contamination with organic matter, and the method for sample analysis. This article focuses on the influence of equipment resolution setup on the backscattered electron images of the sample. The pixel size of these images plays a crucial role in determining the detectability of iGSR particles, especially those with sizes close to the pixel size. In this study, we calculated the probability of missing all characteristic iGSR particles in a sample using an SEM/EDS automated search and how it depends on the image pixel resolution setup. We developed and validated an iGSR particle detection model that links particle size with equipment registers and applied it to 320 samples analyzed by a forensic science laboratory. Our results show that the probability of missing all characteristic iGSR particles due to their size is below 5% for pixel sizes below 0.32 μm2. These findings indicate that pixel sizes as large as twice the one commonly used in laboratory casework, that is, 0.16 μm2, are effective for initial sample scanning, yielding good detection rates of characteristic particles that could exponentially reduce laboratory workload.  相似文献   
192.
Conventional dental age estimation relies on destructive methods such as sectioning and staining, which are unpreferable when the tooth is required for evidential or archeological preservation. MicroCT is a non-destructive, high-resolution imaging technique that allows for accurate morphometrical measurement. Although microCT technology has been applied in a variety of dental studies, studies focusing on dental age-related change and dental age estimation based on microCT imaging remain lacking. Based on the question: “How has microCT technology been applied in studying human age-related tooth morphological change and dental age estimation studies?”, the authors conducted a scoping review in accordance with the Arksey and O'Malley (2005) and the PRISMA-ScR guidelines. A literature search using five major scientific databases identified 452 articles, with 11 full-text articles being eligible to be included in the scoping review. Furthermore, 6 out of the 11 studies performed dental age estimation modeling. An overview of the parameters used in the selected articles revealed a variety of tooth characteristics, such as pulp cavity to whole tooth volume ratio, secondary dentin, as well as the diameter of root canal orifice. The findings of this scoping review highlight the extent microCT is used in studying dental age-related changes, as well as the effectiveness of microCT in dental age estimation studies. This review serves as a guide for future forensic odontology age estimation studies.  相似文献   
193.
Timewise temperature variations in objects that are undergoing unsteady heating or cooling is a commonly encountered problem in the thermal sciences. One particular area of application is the cooling of a body post-death and the use of body temperatures to estimate the time of death. Here, a new approach based on the theory of transient heat transfer is formulated to allow efficient calculation of unsteady conduction problems. The theoretically derived unsteady temperature models are compared with experimentally based correlations (the Marshall-Hoare-Henssge model). The two approaches are found to agree very well. With this new theoretically based approach, timewise temperature variation can be calculated for both large and small Biot number transient problems.  相似文献   
194.
In 2004, for the first time in history, the United States SupremeCourt addressed the meaning and scope of the Alien Tort Statute(ATS) of 1789. Originally intended to provide redress for actsof piracy or offences against ambassadors, the Statute has beenused since the 1980 watershed case of Filartiga v. Peña-Iralato award damages in civil trials in the United States to foreignvictims of, inter alia, torture, summary execution and forceddisappearance. Opponents have claimed, among other things, thatuse of the ATS shows disregard for principles of internationalcomity; is inconsistent with principles governing the use ofuniversal jurisdiction; and results in an imperialist Americanprivatization of human rights. The author argues that the SupremeCourt's decision in Sosa v. Alvarez-Machain limits the ATS toa tool of complementary justice consistent with prevailing principlesof global accountability.  相似文献   
195.
This article draws preliminary lessons from the experience of engaging village elites in support of a BRAC programme for ultra-poor women in rural Bangladesh. It describes the origins, aims, and operation of this programme, which provides comprehensive livelihood support and productive assets to the extreme poor. Based on field research in the rural north-west, the article examines the conditions under which elites can support interventions for the ultra-poor, and the risks and benefits of such engagement. It describes the impact of committees mandated to support ultra-poor programme participants, and attempts to understand the somewhat paradoxical success of this intervention. Conclusions and lessons from the experience involve revisiting assumptions that dominate scholarship and programmes relating to the politics of poverty in rural Bangladesh.  相似文献   
196.
The so‐called Good Governance Model requires perfect public administration that is accountable, efficient, equitable, representative, responsive and transparent and that respects the rule of law. Accordingly, the Good Governance Movement promotes a variety of public administration reforms worldwide. However, the effectiveness of promoting all kinds of administrative reforms at once is in question, because that could overwhelm the reform capability of countries, and more important, some reforms can compete with, rather than complement, one another. Such scenarios are possible, and the implication is clear: administrative reform discourse must consider how to best sequence and prioritize reforms, the outcomes of which must be identified. The experiences of Japan and Singapore offer some insight into this. This study first codifies administrative reforms by using the concepts of administrative themes, and it systematically traces, compares and contrasts reforms in both countries in light of these themes. This leads to the conclusion that the sequences in which administrative reforms evolved in those places contributed to dissimilarities in their administrative traditions today. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
197.
CCTV surveillance systems are IoT products that can be found almost everywhere. Their digital forensic analysis often plays a key role in solving crimes. However, it is common for these devices to use proprietary file systems, which frequently hinders a complete examination. HIKVISION is a well-known manufacturer of such devices that typically ships its products with its proprietary file system. The HIKVISION file system has been analyzed before but that research has focused on the recovery of video footage. In this paper, the HIKVISION file system is being revisited regarding the log records it stores. More specifically, these log records are thoroughly examined to uncover both their structure and meaning. These unexplored pieces of evidence remain unexploited by major commercial forensic software, yet they can contain critical information for an investigation. To further assist digital forensic examiners with their analysis, a Python utility, namely the Hikvision Log Analyzer, was developed as part of this study that can automate part of the process.  相似文献   
198.
199.
中日两国在东亚区域内贸易中地位的变化及其影响   总被引:6,自引:0,他引:6  
东亚区域内贸易比重的迅速上升是现阶段东亚贸易发展的一个重要特征。中国和日本作为东亚区域内两个最大的经济体,两国在东亚区域内贸易中的地位和影响力的变动对相互之间的经济合作以及区域内经济合作模式的选择,具有十分重大的影响。本文在分析东亚区域内贸易发展现状的基础上,从中间产品和最终产品的贸易结构与贸易竞争压力的角度,分析了中日两国在东亚区域内贸易中地位的变动及其影响。  相似文献   
200.
国际海盗问题与中国海上通道安全   总被引:1,自引:0,他引:1  
作为世界贸易大国和能源进口大国,中国的发展越来越依赖于海外,海上通道安全对保障中国国家安全的重要性日益凸显。海盗作为一种国际犯罪行为,严重影响国际海上航运安全,也对中国海上战略通道安全构成现实威胁。海盗治理成为关系到中国海上通道安全的重大问题,必须采取积极有效措施加以解决。为此,我们必须进一步完善国内反海盗立法和反海盗机制;充分发挥联合国的作用,建立打击海盗、维护海上通道安全的长效机制;积极推动反海盗的国际和地区合作;增强防御海盗的力量和意识,重视远洋海军建设;坚持标本兼治,积极推进海盗所属国或地区的和平、发展和稳定。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号