全文获取类型
收费全文 | 480篇 |
免费 | 20篇 |
专业分类
各国政治 | 25篇 |
工人农民 | 14篇 |
世界政治 | 46篇 |
外交国际关系 | 38篇 |
法律 | 231篇 |
中国政治 | 3篇 |
政治理论 | 136篇 |
综合类 | 7篇 |
出版年
2024年 | 3篇 |
2023年 | 15篇 |
2021年 | 7篇 |
2019年 | 6篇 |
2018年 | 15篇 |
2017年 | 12篇 |
2016年 | 19篇 |
2015年 | 19篇 |
2014年 | 16篇 |
2013年 | 66篇 |
2012年 | 7篇 |
2011年 | 10篇 |
2010年 | 10篇 |
2009年 | 23篇 |
2008年 | 18篇 |
2007年 | 18篇 |
2006年 | 12篇 |
2005年 | 10篇 |
2004年 | 6篇 |
2003年 | 10篇 |
2002年 | 16篇 |
2001年 | 10篇 |
2000年 | 6篇 |
1999年 | 5篇 |
1998年 | 6篇 |
1997年 | 6篇 |
1996年 | 8篇 |
1995年 | 5篇 |
1994年 | 7篇 |
1993年 | 6篇 |
1992年 | 5篇 |
1991年 | 9篇 |
1990年 | 6篇 |
1989年 | 7篇 |
1988年 | 7篇 |
1987年 | 8篇 |
1986年 | 5篇 |
1985年 | 5篇 |
1984年 | 8篇 |
1983年 | 5篇 |
1982年 | 7篇 |
1980年 | 3篇 |
1979年 | 3篇 |
1978年 | 4篇 |
1975年 | 3篇 |
1974年 | 4篇 |
1972年 | 6篇 |
1966年 | 3篇 |
1965年 | 3篇 |
1964年 | 2篇 |
排序方式: 共有500条查询结果,搜索用时 15 毫秒
191.
Tooth-colored restorative materials are increasingly being placed in the practice of modern dentistry, replacing traditional materials such as amalgam. Many restorative resins have distinct elemental compositions that allow identification of brand. Not only are resins classifiable by elemental content, but they also survive extreme conditions such as cremation. This is of significance to the forensic odontologist because resin uniqueness adds another level of certainty in victim identification, especially when traditional means are exhausted. In this three-part study, unique combinations of resins were placed in six human cadavers (total 70 restorations). Simulated ante-mortem dental records were created. In a blind experiment, a portable X-ray fluorescence (XRF) unit was used to locate and identify the resin brands placed in the dentition. The technique was successful in location and brand identification of 53 of the restorations, which was sufficient to enable positive victim identification among the study group. This part of the experiment demonstrated the utility of portable XRF in detection and analysis of restorative materials for victim identification in field or morgue settings. Identification of individuals after cremation is a more difficult task, as the dentition is altered by shrinkage and fragmentation, and may not be comparable with a dental chart. Identification of processed cremains is a much greater challenge, as comminution obliterates all structural relationships. Under both circumstances, it is the nonbiological artifacts that aid in identification. Restorative resin fillings can survive these conditions, and can still be named by brand utilizing elemental analysis. In a continuation of the study, the cadavers were cremated in a cremation retort under standard mortuary conditions. XRF was again used to analyze retrieved resins and to identify the individuals based on restorative materials known to exist from dental records. The cremains were then processed and the analysis was repeated to determine whether restorative resins could be found under this extreme condition. Under both circumstances, sufficient surviving resin material was found to distinguish positively each individual in the study group. This study showed the utility of XRF as an analytical tool for forensic odontology and also the significance of the role of restorative resins in victim identification, even after cremation. 相似文献
192.
Isabelle Montani Raymond Marquis Nicole Egli Anthonioz Christophe Champod 《Science & justice》2019,59(1):1-8
This paper explores procedural mechanisms to resolve differing conclusions when two experts have initially worked independently. These experts can be two human examiners or one of them may be a computer-based model. The resolving process is presented as part of the ACE-V protocol adopted widely in pattern recognition areas (e.g. fingerprints, footwear marks, toolmarks or handwritings/signatures comparisons). It set the conditions of operations and delineates a resolving process that is based on the principles of transparency and detailed argumentations. We predict a gradual but steady introduction of computer-based models in the forensic pattern recognition areas. In our opinion, the rules to resolve differing opinions ought to be articulated and documented in the form of standard operating procedures, before any deployment in casework practice. 相似文献
193.
D.C. Paul J. Taylor Henry Mwiki Ali Dehghantanha Alex Akibini Kim Kwang Raymond Choo Mohammad Hammoudeh Reza Parizi 《Science & justice》2019,59(3):337-348
Minecraft, a Massively Multiplayer Online Game (MMOG), has reportedly millions of players from different age groups worldwide. With Minecraft being so popular, particularly with younger audiences, it is no surprise that the interactive nature of Minecraft has facilitated the commission of criminal activities such as denial of service attacks against gamers, cyberbullying, swatting, sexual communication, and online child grooming. In this research, there is a simulated scenario of a typical Minecraft setting, using a Linux Ubuntu 16.04.3 machine (acting as the MMOG server) and Windows client devices running Minecraft. Server and client devices are then examined to reveal the type and extent of evidential artefacts that can be extracted. 相似文献
194.
Craig J. Forsyth Jing Chen Raymond W. Biggar York A. Forsyth 《Criminal Justice Studies》2019,32(3):287-295
This paper uses data on tenth graders from the 2016 Caring Communities Youth Survey (CCYS) to examine the lifetime abstainer from drugs. The abstainer has been a part of Life Course Development literature; within each of the several ages of onset models. Using a model which examines the abstainer from each drug and all drugs, the effect of Prosocial Factors (peer and school) are examined. Findings indicate a very low relationship between high protective/prosocial factors and abstaining. The research of Moffitt that there may be several subtypes of abstainers is supported. 相似文献
195.
Niken Dwi Wahyu Cahyani M.S. Ben Martini Ph.D. Kim‐Kwang Raymond Choo Ph.D. Nurul Hidayah Ab Rahman Ph.D. Helen Ashman Ph.D. 《Journal of forensic sciences》2018,63(3):868-881
Communication apps can be an important source of evidence in a forensic investigation (e.g., in the investigation of a drug trafficking or terrorism case where the communications apps were used by the accused persons during the transactions or planning activities). This study presents the first evidence‐based forensic taxonomy of Windows Phone communication apps, using an existing two‐dimensional Android forensic taxonomy as a baseline. Specifically, 30 Windows Phone communication apps, including Instant Messaging (IM) and Voice over IP (VoIP) apps, are examined. Artifacts extracted using physical acquisition are analyzed, and seven digital evidence objects of forensic interest are identified, namely: Call Log, Chats, Contacts, Locations, Installed Applications, SMSs and User Accounts. Findings from this study would help to facilitate timely and effective forensic investigations involving Windows Phone communication apps. 相似文献
196.
Adam J. Brown William Bradley Glisson Todd R. Andel Kim-Kwang Raymond Choo 《Computer Law & Security Report》2018,34(6)
The advent of cloud computing has brought the computing power of corporate data processing and storage centers to lightweight devices. Software-as-a-service cloud subscribers enjoy the convenience of personal devices along with the power and capability of a service. Using logical as opposed to physical partitions across cloud servers, providers supply flexible and scalable resources. Furthermore, the possibility for multitenant accounts promises considerable freedom when establishing access controls for cloud content. For forensic analysts conducting data acquisition, cloud resources present unique challenges. Inherent properties such as dynamic content, multiple sources, and nonlocal content make it difficult for a standard to be developed for evidence gathering in satisfaction of United States federal evidentiary standards in criminal litigation. Development of such standards, while essential for reliable production of evidence at trial, may not be entirely possible given the guarantees to privacy granted by the Fourth Amendment and the Electronic Communications Privacy Act. Privacy of information on a cloud is complicated because the data is stored on resources owned by a third-party provider, accessible by users of an account group, and monitored according to a service level agreement. This research constructs a balancing test for competing considerations of a forensic investigator acquiring information from a cloud. 相似文献
197.
198.
199.
200.