全文获取类型
收费全文 | 12774篇 |
免费 | 666篇 |
专业分类
各国政治 | 569篇 |
工人农民 | 418篇 |
世界政治 | 1019篇 |
外交国际关系 | 454篇 |
法律 | 8044篇 |
中国共产党 | 1篇 |
中国政治 | 71篇 |
政治理论 | 2802篇 |
综合类 | 62篇 |
出版年
2021年 | 65篇 |
2020年 | 221篇 |
2019年 | 266篇 |
2018年 | 284篇 |
2017年 | 353篇 |
2016年 | 363篇 |
2015年 | 293篇 |
2014年 | 315篇 |
2013年 | 1360篇 |
2012年 | 269篇 |
2011年 | 358篇 |
2010年 | 336篇 |
2009年 | 352篇 |
2008年 | 351篇 |
2007年 | 314篇 |
2006年 | 343篇 |
2005年 | 312篇 |
2004年 | 328篇 |
2003年 | 302篇 |
2002年 | 303篇 |
2001年 | 511篇 |
2000年 | 457篇 |
1999年 | 328篇 |
1998年 | 233篇 |
1997年 | 185篇 |
1996年 | 156篇 |
1995年 | 168篇 |
1994年 | 183篇 |
1993年 | 172篇 |
1992年 | 225篇 |
1991年 | 250篇 |
1990年 | 241篇 |
1989年 | 255篇 |
1988年 | 242篇 |
1987年 | 228篇 |
1986年 | 269篇 |
1985年 | 240篇 |
1984年 | 199篇 |
1983年 | 199篇 |
1982年 | 149篇 |
1981年 | 141篇 |
1980年 | 105篇 |
1979年 | 142篇 |
1978年 | 102篇 |
1977年 | 95篇 |
1976年 | 88篇 |
1974年 | 100篇 |
1973年 | 84篇 |
1972年 | 73篇 |
1969年 | 57篇 |
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
911.
A new method for diatom detection is described. It includes an ultrasonic irradiation procedure with the use of a tissue solubilizer. The method is easy to carry out and is less time-consuming than previous techniques. 相似文献
912.
913.
914.
915.
916.
Contrary to apparent differences in timing and style between Harold D. Lasswells political psychology and the policy sciences approach that he pioneered, the continuity and compatibility between the two are very high. The appropriateness of Lasswells political psychology framework for addressing the intellectual tasks of the policy sciences is demonstrated by linking the insights of his political psychology to the policy sciences framework, and reviewing the common pragmatist philosophy underlying both his political psychology and the policy sciences. 相似文献
917.
Clinical forensic medicine and its main fields of activity from the foundation of the German Society of Legal Medicine until today 总被引:2,自引:0,他引:2
Pollak S 《Forensic science international》2004,144(2-3):269-283
The fields mainly covered by clinical forensic medicine are subject to time-related changes which are described on the basis of the German literature of the 20th century. Some fields of forensic sexual medicine (diagnosis of virginity, proof of criminal abortion, potentia coeundi, potentia generandi, potentia concipiendi) have become less important in the daily work of medicolegal institutes, whereas victims of rape and sexual abuse continue to form a major part of the forensic examination material in the German-speaking countries. The evaluation of suspected physical child abuse has grown in importance since the 60s, and it is essentially the merit of Elisabeth Trube-Becker that this problem is now dealt with also in scientific medicine. More recently, medicolegal experts are increasingly confronted with further groups of persons: victims of domestic violence, abused/neglected seniors, refugees from countries where torture is used. A new special field, which established itself only in the 90s, is the estimation of age with regard to the criminal responsibility of suspects who have no identity papers or pretend to have none. A phenomenon frequently observed in the last two decades is the non-accidental self-infliction of injuries. Whereas in the first half of the 20th century the motive for self-mutilation was typically to evade military service, this category of injury was later mainly seen in the context of insurance fraud; more recently most forensically relevant self-inflicted injuries refer to simulated offenses (fictitious sexual offenses and robbery, attacks allegedly having a political background). One of the traditional fields of clinical forensic medicine continues to be the evaluation of victims and suspects following bodily harm and attempted homicides. In the field of civil law medicolegal experts are particularly often concerned with controversial consequences of traffic accidents (e.g. alleged whiplash injuries after rear-end collisions at low velocities). 相似文献
918.
Robino C Varacalli S Gino S Chatzikyriakidou A Kouvatsi A Triantaphyllidis C Di Gaetano C Crobu F Matullo G Piazza A Torre C 《Forensic science international》2004,146(1):61-64
Eight Y chromosome short tandem repeat (STR) polymorphisms (DYS19, DYS385, DYS389I, DYS389II, DYS390, DYS391, DYS392, and DYS393) were analyzed in the sample of 117 unrelated Albanian males living in Kosovo. A general STR allelic frequency pattern in the Albanian population from Kosovo corresponds to other European populations. Fourty six haplotypes were observed in single copy. The most frequent haplotypes were (DYS19-DYS385-DYS389I-DYS389II-DYS390-DYS391-DYS392-DYS393) 14-11/11-13-29-24-11-13-13 (10.26%), 14-14/17-12-28-24-10-11-12 (9.40%), 13-16/18-13-30-24-10-11-13 (9.40%), and 14-17/17-13-31-24-10-11-13 (9.40%). 相似文献
919.
920.
Spamming is a major threat to the formation of public trust in the Internet and discourages broader civil participation in the emerging information society. To the individual, spams are usually little more than a nuisance, but collectively they expose Internet users to a panoply of new risks while threatening the communications and commercial infrastructure. Spamming also raises important questions of criminological interest. On the one hand it is an example of a pure cybercrime – a harmful behaviour mediated by the Internet that is the subject of criminal law, while on the other hand, it is a behaviour that has in practice been most effectively contained technologically by the manipulation of ‘code’ – but at what cost? Because there is not an agreed meaning as to what constitutes ‘online order’ that renders it simply and uncritically reducible to a set of formulae and algorithms that can be subsequently imposed (surreptitiously) by technological processes. The imposition of order online, as it is offline, needs to be subject to critical discussion and also checks and balances that have their origins in the authority of law. This article deconstructs and analyses spamming behaviour, before exploring the boundaries between law and code (technology) as governance in order to inform and stimulate the debate over the embedding of cybercrime prevention policy within the code itself. 相似文献