首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   544篇
  免费   21篇
各国政治   32篇
工人农民   41篇
世界政治   67篇
外交国际关系   39篇
法律   246篇
中国政治   4篇
政治理论   130篇
综合类   6篇
  2023年   11篇
  2022年   2篇
  2021年   8篇
  2020年   16篇
  2019年   21篇
  2018年   19篇
  2017年   33篇
  2016年   34篇
  2015年   16篇
  2014年   21篇
  2013年   89篇
  2012年   24篇
  2011年   23篇
  2010年   27篇
  2009年   19篇
  2008年   22篇
  2007年   25篇
  2006年   19篇
  2005年   18篇
  2004年   24篇
  2003年   13篇
  2002年   9篇
  2001年   7篇
  2000年   6篇
  1999年   3篇
  1998年   7篇
  1995年   2篇
  1994年   2篇
  1993年   1篇
  1992年   2篇
  1991年   6篇
  1990年   6篇
  1989年   2篇
  1988年   3篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   2篇
  1977年   1篇
  1975年   1篇
  1974年   1篇
  1973年   3篇
  1970年   1篇
  1969年   4篇
  1968年   1篇
排序方式: 共有565条查询结果,搜索用时 0 毫秒
451.
452.
453.
454.
There are many situations in which deception may arise and understanding the behaviors associated with it are compounded by various contexts in which it may occur. This paper sets out a coding protocol for identifying cues to deception and reports on three studies, in which deception was studied in different contexts. The contexts involved manipulating risks (i.e., probability) of being detected and reconnaissance, both of which are related to terrorist activities. Two of the studies examined the impact of changing the risks of deception detection, whilst the third investigated increased cognitive demand of duplex deception tasks including reconnaissance and deception. In all three studies, cues to deception were analyzed in relation to observable body movements and subjective impressions given by participants. In general, the results indicate a pattern of hand movement reduction by deceivers, and suggest the notion that raising the risk of detection influences deceivers’ behaviors. Participants in the higher risk condition displayed increased negative affect (found in deceivers) and tension (found in both deceivers and truth-tellers) than those in lower risk conditions.  相似文献   
455.
456.
This is the first report regarding the characterization of the new synthetic cannabinoid 4F‐MDMB‐BINACA. 4F‐MDMB‐BINACA was first analytically confirmed in seized drug material using gas chromatography–mass spectrometry (GC‐MS), liquid chromatography–quadrupole time‐of‐flight mass spectrometry (LC‐QTOF), and nuclear magnetic resonance (NMR) spectroscopy. Subsequent to this characterization, 4F‐MDMB‐BINACA was detected in biological specimens collected as part of forensically relevant casework, including medicolegal death investigations and drug impaired driving investigations, from a variety of regions in the United States. Further analysis of biological specimens resulted in the identification of the metabolites 4F‐MDMB‐BINACA 3,3‐dimethylbutanoic acid and 4‐OH‐MDMB‐BINACA. 4F‐MDMB‐BINACA is appearing with increasing frequency as a contributory factor in deaths, creating morbidity and mortality risks for drug users. Laboratories must be aware of its presence and impact, incorporating 4F‐MDMB‐BINACA into workflows for detection and confirmation.  相似文献   
457.
Identity fraud as a term and concept in its formative stages was often presumed to be identity theft and visa versa. However, identity theft is caused by the identities (or tokens) of individuals or organisations being stolen is an enabling precursor to identity fraud. The boundaries of identity fraud and identity theft are now better defined. The absence of specific identity crime legislation could be a cause of perpetrators not classified as breaching identity crimes but under other specific entrenched law such as benefit fraud, or credit card fraud. This metrics overlap can cause bias in crime management information systems. This study uses a multi-method approach where data was collected in both a quantitative and qualitative manner. These approaches are used as a lens for defining different classes of online identity crimes in a crime management (IS) security context. In doing so, we contribute to a deeper understanding of identity crime by specifically examining its hierarchical classes and definitions; to aid clearer structure in crime management IS. We seek to answer the questions: should current law around identity fraud continue to be reinforced and measures introduced to prevent identity crime; should laws be amended; or should new identity crime laws be constructed? We conclude and recommend a solution incorporating elements of all three.  相似文献   
458.
Deterrence lies at the heart of the criminal justice system and policy. There is a lack of information on citizen??s perceptions regarding a critical element of the deterrence process as it manifests through the communication of sanction threats. This study uses data from over 400 adults to examine their knowledge regarding the probability of detection and the average punishments for DUI, and also assesses the contribution of demographic and theoretical variables in predicting perceptions of detection probabilities and punishment estimates. Results show that persons over-estimate the likelihood of detection and provide higher estimates for average sentence lengths, but very few variables predict deterrence perceptions. An investigation of the resetting effect shows that persons tend to lower the estimated likelihood of punishment after experiencing a punishment. Deterrence may work better if researchers and policy officials understand what influences these perceptions and how they may be modified.  相似文献   
459.
Fundamental to any ballistic armour standard is the reference projectile that is to be defeated. Typically, for certification, consistency of bullets is assumed. Therefore, practical variations in bullet jacket dimensions can have far reaching consequences. Traditionally, internal dimensions could only be analysed by cutting bullets which rules out any subsequent ballistic assessment. Therefore, the use of a non-destructive X-ray computed tomography (CT) method is explored in this paper. A set of 10 bullets (9 mm DM11) was taken for analysing both intra and inter bullet jacket thickness variation. CT measurements of jacket thickness were validated with high resolution scanning electron microscope (SEM) images. An image based analysis methodology has been developed to extract the jacket thickness map and the centre of gravity. Thickness variations of the order of 200 μm were found commonly across all the bullets along the length and an angular variation of up to 100 μm was found in a few bullets. Jacket thickness and centre of gravity were also calculated for the same bullets after impact and the variations between the pre- and post-impacted bullets were compared, by establishing a common physical reference. The results show that the proposed CT scanning approach and subsequent image analysis method can bring out the statistical variations in bullet geometry pre- and post impact effectively.  相似文献   
460.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号