全文获取类型
收费全文 | 584篇 |
免费 | 25篇 |
专业分类
各国政治 | 39篇 |
工人农民 | 45篇 |
世界政治 | 67篇 |
外交国际关系 | 42篇 |
法律 | 269篇 |
中国政治 | 4篇 |
政治理论 | 137篇 |
综合类 | 6篇 |
出版年
2023年 | 12篇 |
2022年 | 2篇 |
2021年 | 8篇 |
2020年 | 16篇 |
2019年 | 24篇 |
2018年 | 22篇 |
2017年 | 37篇 |
2016年 | 37篇 |
2015年 | 19篇 |
2014年 | 22篇 |
2013年 | 99篇 |
2012年 | 26篇 |
2011年 | 24篇 |
2010年 | 27篇 |
2009年 | 22篇 |
2008年 | 22篇 |
2007年 | 26篇 |
2006年 | 20篇 |
2005年 | 18篇 |
2004年 | 25篇 |
2003年 | 15篇 |
2002年 | 9篇 |
2001年 | 7篇 |
2000年 | 7篇 |
1999年 | 3篇 |
1998年 | 6篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 8篇 |
1990年 | 6篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1986年 | 2篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 2篇 |
1977年 | 1篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1973年 | 3篇 |
1970年 | 1篇 |
1969年 | 4篇 |
1968年 | 1篇 |
排序方式: 共有609条查询结果,搜索用时 8 毫秒
491.
Commentary on: Gauriot R,Gunaratnam L,Moroni R,Reinikainen T,Corander R. Statistical Challenges in the Quantification of Gunshot Residue Evidence. J Forensic Sci 2013;58(5);1149–55 下载免费PDF全文
492.
493.
494.
Ke Zhang Lara A. Frumkin Alex Stedmon Glyn Lawson 《Journal of Police and Criminal Psychology》2013,28(2):150-161
There are many situations in which deception may arise and understanding the behaviors associated with it are compounded by various contexts in which it may occur. This paper sets out a coding protocol for identifying cues to deception and reports on three studies, in which deception was studied in different contexts. The contexts involved manipulating risks (i.e., probability) of being detected and reconnaissance, both of which are related to terrorist activities. Two of the studies examined the impact of changing the risks of deception detection, whilst the third investigated increased cognitive demand of duplex deception tasks including reconnaissance and deception. In all three studies, cues to deception were analyzed in relation to observable body movements and subjective impressions given by participants. In general, the results indicate a pattern of hand movement reduction by deceivers, and suggest the notion that raising the risk of detection influences deceivers’ behaviors. Participants in the higher risk condition displayed increased negative affect (found in deceivers) and tension (found in both deceivers and truth-tellers) than those in lower risk conditions. 相似文献
495.
Alex J. Krotulski M.S.F.S. Amanda L.A. Mohr M.S.F.S. Sherri L. Kacinko Ph.D. Melissa F. Fogarty M.S.F.S. Sarah A. Shuda M.S.F.S. Francis X. Diamond B.S. William A. Kinney Ph.D. M.J. Menendez J.D. Barry K. Logan Ph.D. 《Journal of forensic sciences》2019,64(5):1451-1461
This is the first report regarding the characterization of the new synthetic cannabinoid 4F‐MDMB‐BINACA. 4F‐MDMB‐BINACA was first analytically confirmed in seized drug material using gas chromatography–mass spectrometry (GC‐MS), liquid chromatography–quadrupole time‐of‐flight mass spectrometry (LC‐QTOF), and nuclear magnetic resonance (NMR) spectroscopy. Subsequent to this characterization, 4F‐MDMB‐BINACA was detected in biological specimens collected as part of forensically relevant casework, including medicolegal death investigations and drug impaired driving investigations, from a variety of regions in the United States. Further analysis of biological specimens resulted in the identification of the metabolites 4F‐MDMB‐BINACA 3,3‐dimethylbutanoic acid and 4‐OH‐MDMB‐BINACA. 4F‐MDMB‐BINACA is appearing with increasing frequency as a contributory factor in deaths, creating morbidity and mortality risks for drug users. Laboratories must be aware of its presence and impact, incorporating 4F‐MDMB‐BINACA into workflows for detection and confirmation. 相似文献
496.
497.
Rodger Jamieson Lesley Pek Wee Land Donald Winchester Greg Stephens Alex Steel Alana Maurushat Rick Sarre 《Computer Law & Security Report》2012
Identity fraud as a term and concept in its formative stages was often presumed to be identity theft and visa versa. However, identity theft is caused by the identities (or tokens) of individuals or organisations being stolen is an enabling precursor to identity fraud. The boundaries of identity fraud and identity theft are now better defined. The absence of specific identity crime legislation could be a cause of perpetrators not classified as breaching identity crimes but under other specific entrenched law such as benefit fraud, or credit card fraud. This metrics overlap can cause bias in crime management information systems. This study uses a multi-method approach where data was collected in both a quantitative and qualitative manner. These approaches are used as a lens for defining different classes of online identity crimes in a crime management (IS) security context. In doing so, we contribute to a deeper understanding of identity crime by specifically examining its hierarchical classes and definitions; to aid clearer structure in crime management IS. We seek to answer the questions: should current law around identity fraud continue to be reinforced and measures introduced to prevent identity crime; should laws be amended; or should new identity crime laws be constructed? We conclude and recommend a solution incorporating elements of all three. 相似文献
498.
Alex R. Piquero Nicole Leeper Piquero Marc Gertz Jake Bratton Thomas A. Loughran 《American Journal of Criminal Justice》2012,37(4):630-646
Deterrence lies at the heart of the criminal justice system and policy. There is a lack of information on citizen??s perceptions regarding a critical element of the deterrence process as it manifests through the communication of sanction threats. This study uses data from over 400 adults to examine their knowledge regarding the probability of detection and the average punishments for DUI, and also assesses the contribution of demographic and theoretical variables in predicting perceptions of detection probabilities and punishment estimates. Results show that persons over-estimate the likelihood of detection and provide higher estimates for average sentence lengths, but very few variables predict deterrence perceptions. An investigation of the resetting effect shows that persons tend to lower the estimated likelihood of punishment after experiencing a punishment. Deterrence may work better if researchers and policy officials understand what influences these perceptions and how they may be modified. 相似文献
499.
Kumar J Landheer D Barnes-Warden J Fenne P Attridge A Williams MA 《Forensic science international》2012,214(1-3):48-58
Fundamental to any ballistic armour standard is the reference projectile that is to be defeated. Typically, for certification, consistency of bullets is assumed. Therefore, practical variations in bullet jacket dimensions can have far reaching consequences. Traditionally, internal dimensions could only be analysed by cutting bullets which rules out any subsequent ballistic assessment. Therefore, the use of a non-destructive X-ray computed tomography (CT) method is explored in this paper. A set of 10 bullets (9 mm DM11) was taken for analysing both intra and inter bullet jacket thickness variation. CT measurements of jacket thickness were validated with high resolution scanning electron microscope (SEM) images. An image based analysis methodology has been developed to extract the jacket thickness map and the centre of gravity. Thickness variations of the order of 200 μm were found commonly across all the bullets along the length and an angular variation of up to 100 μm was found in a few bullets. Jacket thickness and centre of gravity were also calculated for the same bullets after impact and the variations between the pre- and post-impacted bullets were compared, by establishing a common physical reference. The results show that the proposed CT scanning approach and subsequent image analysis method can bring out the statistical variations in bullet geometry pre- and post impact effectively. 相似文献
500.