首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5717篇
  免费   131篇
各国政治   236篇
工人农民   225篇
世界政治   456篇
外交国际关系   207篇
法律   3582篇
中国政治   49篇
政治理论   1076篇
综合类   17篇
  2021年   40篇
  2020年   69篇
  2019年   103篇
  2018年   131篇
  2017年   115篇
  2016年   118篇
  2015年   68篇
  2014年   118篇
  2013年   583篇
  2012年   140篇
  2011年   151篇
  2010年   122篇
  2009年   138篇
  2008年   167篇
  2007年   155篇
  2006年   140篇
  2005年   129篇
  2004年   155篇
  2003年   123篇
  2002年   100篇
  2001年   310篇
  2000年   277篇
  1999年   193篇
  1998年   79篇
  1997年   79篇
  1996年   52篇
  1995年   54篇
  1994年   48篇
  1993年   38篇
  1992年   121篇
  1991年   139篇
  1990年   131篇
  1989年   126篇
  1988年   113篇
  1987年   125篇
  1986年   100篇
  1985年   95篇
  1984年   96篇
  1983年   83篇
  1982年   57篇
  1981年   73篇
  1980年   34篇
  1979年   73篇
  1978年   43篇
  1975年   37篇
  1974年   49篇
  1973年   54篇
  1972年   39篇
  1971年   34篇
  1970年   29篇
排序方式: 共有5848条查询结果,搜索用时 234 毫秒
991.
Abstract

This article analyzes contextual and organizational challenges and constraints faced by think tanks in Bangladesh. It argues that while think tanks have been visible in the policy discourse through fostering policy debates and advocating policy proposals, their direct impact on policy outcomes remains limited. Think tanks’ research findings are often interpreted through the prism of politics. A number of think tanks are institutionally weak and face challenges in funding, attracting researchers, and retaining research focus. Think tanks can potentially focus attention to the wider policy community, and emphasize intermediate influences, such as, building capacity, wider networking and interacting with a broader base of policy-makers, in order to be effective and relevant in the policy discussions.  相似文献   
992.
This article addresses the unsuccessful attempts to suppress free speech during the Korean War, and in particular explains the attempts to silence three reporters of alleged atrocities by United Nations forces. In the absence of carefully targeted legislation, the three individuals – Alan Winnington (a journalist), Monica Felton (a women's movement activist) and Jack Gaster (a solicitor) ‐ were threatened with or investigated for prosecution for treason or sedition, and Winnington was unable to renew his passport until 1968. Drawing heavily on archival sources (including MI5 files, which unusually fail to redact the identity of one of the lawyers who was reporting to Special Branch about Gaster's activities), the article explores the threat to civil liberties from the administrative as well as the legislative and the judicial power of the state. The article concludes by drawing contemporary parallels, and highlighting the continuing relevance of the writings of Winnington, Felton and Gaster.  相似文献   
993.
The ultimate test of whether an association is voluntary or not is if you can leave it. It is difficult, at this remove, to appreciate how live an issue secession from the British commonwealth of nations was in the 1920s and 1930s. It occupied an inordinate amount of time and negotiation for a doctrine that had been ostensibly conceded in 1920. Yet, much as with the case of the appeal to the judicial committee of the privy council, once the dominions sought to take advantage of the freedom which had been guaranteed by official statements, they found a formidable amount of diplomatic pressure and legal opinion brought to bear to indicate that no such right could be officially declared. This article traces the evolution of the arguments about the right to secede in the 1930s, and examines how the right came eventually to be exercised in the case of the new commonwealth countries in the 1940s. It concludes by examining how the doctrine of secession as developed in the 1930s was abandoned in order to retain Indian membership in the commonwealth.  相似文献   
994.
Corporate groups, a ubiquitous feature of modern business, pose formidable challenges for common law courts relying on traditional corporate law doctrine. Arising out of a corporate group's recent bid to recover millions of dollars in lost profits from a former director and CEO who had diverted a core business, Goh Chan Peng v Beyonics Technology Ltd raised thorny issues of separate legal entity doctrine, single economic unit theory, and reflective loss shared by common law legal systems. Despite finding that the defendant had breached his duties to the ultimate holding company, the Singapore Court of Appeal absolved the faithless director from most of his liabilities, relying on limited domestic precedent to the exclusion of a rich body of Commonwealth jurisprudence – including the House of Lords’ landmark Johnson v Gore Wood decision. This note explores the paths not taken by the court, and highlights the pitfalls of a narrow, autochthonous approach to problems of common law doctrine.  相似文献   
995.
An acceptable area for collecting DNA reference sample is a part of the forensic DNA analysis development. The aim of this study was to evaluate skin surface cells (SSC) as an alternate source of reference DNA sample. From each volunteer (n = 10), six samples from skin surface areas (forearm and fingertips) and two traditional samples (blood and buccal cells) were collected. Genomic DNA was extracted and quantified then genotyped using standard techniques. The highest DNA concentration of SSC samples was collected using the tape/forearm method of collection (2.1 ng/μL). Cotton swabs moistened with ethanol yielded higher quantities of DNA than swabs moistened with salicylic acid, and it gave the highest percentage of full STR profiles (97%). This study supports the use of SSC as a noninvasive sampling technique and as a extremely useful source of DNA reference samples among certain cultures where the use of buccal swabs can be considered socially unacceptable.  相似文献   
996.
The ability to obtain DNA profiles from trace biological evidence is routinely demonstrated with so-called ‘touch DNA evidence’, which is generally perceived to be the result of DNA obtained from shed skin cells transferred from a donor's hands to an object or person during direct physical contact. Current methods for the recovery of trace DNA employ swabs or adhesive tape to sample an area of interest. While of practical utility, such ‘blind-swabbing’ approaches will necessarily co-sample cellular material from the different individuals whose cells are present on the item, even though the individuals' cells are principally located in topographically dispersed, but distinct, locations on the item. Thus the act of swabbing itself artifactually creates some of the DNA mixtures encountered in touch DNA samples. In some instances involving transient contact between an assailant and victim, the victim's DNA may be found in such significant excess as to preclude the detection and typing of the perpetrator's DNA. In order to circumvent the challenges with standard recovery and analysis methods for touch DNA evidence, we reported previously the development of a ‘smart analysis’ single cell recovery and DNA analysis method that results in enhanced genetic analysis of touch DNA evidence. Here we use the smart single cell analysis method to recover probative single source profiles from individual and agglomerated cells from various touched objects and clothing items belonging to known donors. We then use the same approach for the detection of single source male donor DNA in simulated physical contact/assault mixture samples (i.e. male ‘assailant’ grabbing the wrist, neck or clothing from the female ‘victim’, or being in transient contact with bedding from the ‘victim’). DNA profiles attributable to the male or female known donors were obtained from 31% and 35% of the single and agglomerated bio-particles (putative cells) tested. The known male donor ‘assailant’ DNA profile was identified in the cell sampling from every mixture type tested. The results of this work demonstrate the efficacy of an alternative strategy to recover single source perpetrator DNA profiles in physical contact/assault cases involving trace perpetrator/victim cellular admixtures.  相似文献   
997.
998.
This article describes a New Zealand forensic agency's contextual information management protocol for bloodstain pattern evidence examined in the laboratory. In an effort to create a protocol that would have minimal impact on current work-flow, while still effectively removing task-irrelevant contextual information, the protocol was designed following an in-depth consultation with management and forensic staff. The resulting design was for a protocol of independent-checking (i.e. blind peer-review) where the checker's interpretation of the evidence is conducted in the absence of case information and the original examiner's notes or interpretation(s). At the conclusion of a ten-case trial period, there was widespread agreement that the protocol had minimal impact on the number of people required, the cost, or the time to complete an item examination. The agency is now looking to adopt the protocol into standard operating procedures and in some cases the protocol has been extended to cover other laboratory-based examinations (e.g. fabric damage, shoeprint examination, and physical fits). The protocol developed during this trial provides a useful example for agencies seeking to adopt contextual information management into their workflow.  相似文献   
999.
At the penalty phase of a capital trial, jurors endorse and weigh aggravators and mitigators. The purpose of the current studies was to examine how gender differences in attributional complexity relate to endorsements of aggravators and mitigators. In Study 1, undergraduate participants read definitions of aggravators and mitigators and rated the extent to which circumstances were aggravating or mitigating. In Study 2, a death qualified community sample read a trial summary, rated the extent to which aggravators and mitigators were present in the case, reported whether mitigators outweighed aggravators, and rendered a sentence. Results indicated that gender differences in mitigator endorsement were mediated by attributional complexity, and that gender differences in sentencing decisions were serially mediated by attributional complexity, mitigator endorsement, and aggravator and mitigator weighing.  相似文献   
1000.
Assessment of performance validity is an essential part of a neuropsychological evaluation, with the inclusion of two or more performance validity tests (PVTs) becoming routine practice. Considering the time to administer multiple tests, there has been some support for use of the Test of Memory Malingering (TOMM) Trial 1 (T1) as an independent, “one and done” PVT. Notably, cutoffs for TOMM T1 need further validation, with an emphasis on minimizing false-positive classifications among those with bona fide cognitive impairment. In a clinically referred sample of 127 veterans, this study examined the role of cognitive impairment in TOMM performance and the utility of a TOMM T1 as an independent PVT. Examinees were administered the TOMM and three additional PVTs as part of a comprehensive neuropsychological battery. Sixty-eight percent of examinees were classified valid (35% of valid examinees were cognitively impaired). TOMM T1?≤?40 had excellent observed sensitivity (83%) and specificity (93%) overall, with minimal false-positive classification. TOMM T1 was also significantly correlated and concordant with other memory-based PVTs. Given score ranges and failure rates for TOMM T1?≤?40 among those with neurological/neurocognitive conditions, scores in the 37–40 range may merit administration of additional TOMM trials to maximize accuracy in identifying valid-cognitively impaired versus noncredible performance. Otherwise, an abbreviated TOMM administration (i.e., only T1) using a cutoff of ≤?40—in conjunction with one or more additional PVTs—may be sufficient for detecting noncredible/invalid test performance in the absence of known or suspected neurological/neurocognitive disorders.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号