首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   56篇
  免费   5篇
各国政治   3篇
工人农民   2篇
世界政治   5篇
外交国际关系   8篇
法律   35篇
政治理论   8篇
  2024年   3篇
  2023年   13篇
  2022年   1篇
  2021年   4篇
  2020年   2篇
  2019年   2篇
  2017年   5篇
  2016年   3篇
  2015年   3篇
  2013年   9篇
  2012年   1篇
  2011年   2篇
  2009年   1篇
  2008年   5篇
  2005年   2篇
  2004年   1篇
  2003年   1篇
  2000年   1篇
  1999年   1篇
  1993年   1篇
排序方式: 共有61条查询结果,搜索用时 14 毫秒
41.
42.
In early 2019, the British government declassified a tranche of Information Research Department files. Among them is a candid and concise overview of British thinking about covert propaganda, complete with a list of examples of British forgery operations. This short piece transcribes the briefing note and provides an introduction. The document sheds new light on UK covert action, but also talks to ongoing scholarly debates in Intelligence Studies and International Relations more broadly.  相似文献   
43.
The collection of delinquent fines is a vast and ongoing public administration challenge. In the United Kingdom, unpaid fines amount to more than 500 million pounds. Managing noncompliant accounts and dispatching bailiffs to collect fines in person is costly. This paper reports the results of a large randomized controlled trial, led by the UK Cabinet Office's Behavioural Insights Team, which was designed to test the effectiveness of mobile phone text messaging as an alternative method of inducing people to pay their outstanding fines. An adaptive trial design was used, first to test the effectiveness of text messaging against no treatment and then to test the relative effectiveness of alternative messages. Text messages, which are relatively inexpensive, are found to significantly increase average payment of delinquent fines. We found text messages to be especially effective when they address the recipient by name.  相似文献   
44.
The body of a 19‐year‐old male was found apparently concealed underneath bushes with recent head and facial trauma, and multiple superficial abrasions. Subsequently, it was discovered that the decedent had been running into objects and buildings following the ingestion the evening before of what was thought to be lysergic acid diethylamide (LSD). Blood staining of a nearby wall close to where the body was lying was in keeping with the described behavior. Toxicology revealed 3,4‐methylenedioxymethamphetamine (Ecstasy), in addition to two only recently available drugs 2‐(4‐bromo‐2,5‐dimethoxyphenyl)‐N‐[(2‐methoxyphenyl)methyl]ethanamine, (25B‐NBOMe), and 1‐(3,4‐methylenedioxyphenyl)‐2‐(1‐pyrrolidinyl)‐1‐butanone, (MDPBP). At autopsy, the skull was fractured with cerebral swelling, contusions, and subarachnoid hemorrhage. Death was due to blunt cranial trauma against a background of mixed drug toxicity. The case demonstrates a rare cause of death in a drug‐induced acute delirium, as well as highlighting two new designer street drugs that may result in significant aberrant behavior.  相似文献   
45.
The benzylation of three low molecular weight N,N-disubstituted ethanolamines related to chemical warfare agents (CWAs) to furnish derivatives with improved gas chromatography-mass spectrometry (GC-MS) profiles is described. Due to their low molecular weight and polar nature, N,N-disubstituted ethanolamines are notoriously difficult to detect by routine GC-MS analyses during Organisation for the Prohibition of Chemical Weapons (OPCW) proficiency tests (PTs), particularly in scenarios when they are present at low levels (~1–10 ppm) amidst more abundant interferences. Our studies revealed that the optimal derivatization conditions involved the treatment of the ethanolamine with benzyl bromide in the presence of an inorganic base (e.g., Na2CO3) in dichloromethane at 55°C for 2 h. This optimized set of conditions was then successfully applied to the derivatization of N,N-dimethylethanolamine, N,N-diethylethanolamine and N,N-diisopropylethanolamine present separately at 1 and 10 μg/mL concentrations in a glycerol-rich matrix sample featured in the 48th OPCW PT. The benzylated derivatives of the three ethanolamines possessed retention times long enough to clear the massive glycerol-containing matrix interferences. The protocol herein is introduced as an alternative method for derivatization of these CWA and pharmaceutically important species and should find broad applicability in laboratories where routine forensic analysis is carried out.  相似文献   
46.
Drawing forensic conclusions from an image or a video is known as “photographic content analysis.” It involves the analysis of an image, as well as objects, actions, and events depicted in images or video. In recent years, photographic depictions of objects suspected as illegal firearms have substantially increased, appearing on CCTV surveillance footage, captured by mobile phones and shared on social media. However, the law in Israel states that a person can be charged with illegally possessing a firearm only if it can be proven that the object is capable of shooting with lethal bullet energy. This becomes more challenging in cases where the firearm was not physically seized, and the evidence exclusively consists of images and video. In this study, photographic content analysis was applied to images and video where objects suspected as commercial or improvised firearms had been depicted. An image and event sequence reconstruction video databases of both firearms and replicas were created in order to better define firearm-specific functional morphological features. We demonstrate that it is possible to classify an object as a firearm by analyzing the functional, and not only the esthetic, morphology in images and video. It is also shown that event sequence reconstruction in video may be used to infer that an object suspected as a firearm has the capacity to shoot by confirming the occurrence of a shooting act or shooting process. Thus, photographic content analysis may be used to forensically establish that an object depicted in an image or a video is a firearm by ruling out other known scenarios, and without physically seizing it.  相似文献   
47.
TASER® weapons are conducted energy weapons (CEWs) that are frequently used by police departments around the world. CEWs can be deployed in two methods: drive stun application and probe deployment. This study aims to examine damages caused by TASER devices on fabrics and whether types of fabric material and TASER models could contribute to different damage features. Three types of white fabric were used, including 100% cotton, 100% polyester, and 65:35 polyester-cotton blend. Three models: TASER X26P, TASER X2, and TASER 7 were shot onto each type of fabric, with five repetitions each. Each damaged area on the fabric caused by a probe is a sample (n = 90) and was examined with a Keyence digital microscope. Images were captured by the Keyence microscope and measurements were recorded, including damage dimensions, fabric condition, evidence of burning, and extra findings. The presence of fused yarn ends was found to be statistically significant across the fabric types, and no damage features were found that may assist in the identification of TASER models. Other damage features including damage dimensions, discoloration, and fiber deformation were not found to be showing apparent differences according to statistical analysis. The conclusions made by this research should be used with caution due to the small sample size.  相似文献   
48.
The primary objective of this paper is to report on the successful implementation of forensic facial approximation in a real case in the forensic context. A three‐dimensional (3D) facial approximation protocol of the skull was performed with free software, applying techniques in a virtual environment that have already been consolidated in the literature. The skull was scanned with the photogrammetry technique, the digital replica was imported in the Blender software (Blender Foundation, Amsterdam) and individualized model sketches of the face were traced with the MakeHuman software (MakeHuman Org) according to the anthropological profile of the victim. The face created was imported in Blender, where it was adapted, modeled, and sculpted on the 3D skull and its soft tissue markers, using an American open‐source application of the technique in the digital environment. The face created in a virtual environment was recognized and legal identification procedures were started, resulting in the more agile delivery of the disappeared body to its next of kin. It is therefore concluded that facial approximation may not be a primary method of human identification, but it can be satisfactorily applied in the forensic field as an individual recognition resource. It has great value in narrowing the search, reducing the number of alleged victims, and leading to identification tests, therefore significantly reducing the number of genetic DNA (deoxyribonucleic acid) tests—which are considered costly for the State or Federation—and consequently reducing the waiting time before delivery of the body to its family.  相似文献   
49.
Why are some parties more likely than others to keep the promises they made during previous election campaigns? This study provides the first large‐scale comparative analysis of pledge fulfillment with common definitions. We study the fulfillment of over 20,000 pledges made in 57 election campaigns in 12 countries, and our findings challenge the common view of parties as promise breakers. Many parties that enter government executives are highly likely to fulfill their pledges, and significantly more so than parties that do not enter government executives. We explain variation in the fulfillment of governing parties’ pledges by the extent to which parties share power in government. Parties in single‐party executives, both with and without legislative majorities, have the highest fulfillment rates. Within coalition governments, the likelihood of pledge fulfillment is highest when the party receives the chief executive post and when another governing party made a similar pledge.  相似文献   
50.
When Eric Anderson published inclusive masculinity theory (IMT), it was largely situated in relationships he observed with first-year undergraduate students. Here, he noticed a striking difference in behaviours and attitudes between the adolescent heterosexual men in the United States, compared to those in the UK. Since IMT’s inception, there has been a great deal of further enquiry into the social lives of young heterosexual men in both of these nations. What is undertheorized, however, is whether the intense emotional and physical tactility of homosocial relationships described in this literature will occur with current and future generations. Nor do we know if men described as exhibiting inclusive masculinities at university continue to do so – and to what degree – as they enter the workplace and develop family ties. This research utilizes 10 semi-structured interviews with the same participants from Anderson’s initial studies, showing that they continue to strive for the same emotional intimacy with male friends that they achieved during their time at university. Half also carried this behaviour into the friendships developed with other men since graduating from university. Thus, this research contributes to IMT as it offers preliminary analysis into the friendships of inclusive men, after their time at university.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号