首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   725篇
  免费   37篇
各国政治   19篇
工人农民   98篇
世界政治   34篇
外交国际关系   23篇
法律   437篇
中国共产党   1篇
中国政治   11篇
政治理论   134篇
综合类   5篇
  2023年   5篇
  2022年   7篇
  2021年   8篇
  2020年   28篇
  2019年   22篇
  2018年   27篇
  2017年   27篇
  2016年   46篇
  2015年   26篇
  2014年   22篇
  2013年   99篇
  2012年   25篇
  2011年   34篇
  2010年   23篇
  2009年   38篇
  2008年   40篇
  2007年   32篇
  2006年   23篇
  2005年   20篇
  2004年   26篇
  2003年   27篇
  2002年   24篇
  2001年   9篇
  2000年   8篇
  1999年   8篇
  1998年   13篇
  1997年   5篇
  1996年   9篇
  1995年   2篇
  1994年   3篇
  1993年   4篇
  1992年   4篇
  1991年   9篇
  1990年   3篇
  1989年   2篇
  1987年   5篇
  1986年   4篇
  1985年   3篇
  1984年   2篇
  1983年   3篇
  1982年   5篇
  1981年   3篇
  1980年   3篇
  1979年   3篇
  1978年   4篇
  1976年   3篇
  1974年   3篇
  1973年   5篇
  1971年   2篇
  1969年   2篇
排序方式: 共有762条查询结果,搜索用时 29 毫秒
601.
602.
Book Reviews     
Food sovereignty, as a counter-movement to the food regime, includes a range of struggles, and is evidently quite elastic as a discourse and practice. Because the food regime itself is evolving and restructuring, food sovereignty embodies movement. In its ‘second generation’ phase it operates on both rural and urban fronts, separately and together, connecting producers, workers, consumers and various activist organizations. Nevertheless, it is important to recognize food sovereignty's origins in the global agrarian crisis of the last three decades. Small producers (peasants, farmers, pastoralists, fishers, forest-dwellers) continue to experience massive displacement by World Trade Organization (WTO)-style ‘free trade’, overlaid with new displacements by fiat, force and finance as land grabbing in various forms proceeds apace. This is a key theme in a response to Henry Bernstein's questions about the character of the food sovereignty movement.  相似文献   
603.
604.
Using a variant of the ecological-transactional model and developmental theories of delinquency on a nationally representative sample of adolescents, the current study explored the ecological predictors of violent victimization, perpetration, and both for three different developmental stages during adolescence. We examined the relative influence of individual and family characteristics, peers, and neighborhood characteristics on the odds of experiencing violent victimization and perpetration over time with two waves of the National Longitudinal Study of Adolescent Health for those adolescents who reported no exposure to violence at Wave 1 (N = 8,267; 50% female; 59% Caucasian; 17% African-American; 14% Hispanic). We found that more proximal factors differentiated between different experiences with violence at Wave 2. Also, negative peers significantly differentiated between violent victimization and perpetration, and this influence was strongest in early adolescence. In exploratory analyses, we found that middle adolescents were particularly vulnerable to their disadvantaged neighborhoods for a high-risk group. This analysis is one of the few that considers multiple ecological contexts simultaneously and provides support for developmental differences within adolescence on the influence that peers and neighborhoods have in predicting violent victimization and perpetration.  相似文献   
605.
Suicidal gunshot wounds to the nasal bridge are rare, particularly at close range (defined as muzzle of the weapon not touching the skin surface, but near enough to deposit soot and stippling). Previously reported suicidal gunshot wounds to the nose have been through the left nostril (Forensic Sci Int 1995;71(1):25–31; J Forensic Radiol Imag 2013;1(2):63–7). The death of a 26-year-old man with a close-range gunshot wound to the bridge of the nose was deemed suicide due to history, scene, and autopsy findings. These findings included previous suicidal ideation, texted and written notes, the decedent's cross-legged position seated on the floor, the trajectory of the bullet through his head and into the ceiling fan and roof above him, and acute alcohol intoxication. This decedent may have been intending a hard contact forehead location but inadvertently fired the gun into the bridge of his nose while bending forward, prior to contact.  相似文献   
606.
Plastic fingerprint impressions found at crime scenes are often too delicate for collection, leaving photography as the best option for documentation. However, traditional photography techniques can be inadequate in documenting minute 3-D details due to limitations of the camera and lighting conditions. This study investigated the feasibility of applying commercially available structured-light 3-D scanners in the documentation of plastic prints. Attempts were made to develop a procedure to extract curvature features from 3-D scanned fingerprints and flatten the friction ridge features into two-dimensional (2-D) images to allow direct comparison with the traditional photography in the CSIpix® Matcher and NFIQ 2.0 software. Two 3-D scanners were evaluated a Dentsply Sirona inEos X5® and an Artec Space Spider. In this study, 3-D scanners demonstrated robustness as well as efficiency in the collection of plastic fingerprint impressions in select substrates. One of the developed methods utilizing a discrete geometry operator and convexity features outperformed traditional photography, achieving higher software detection scores in minutiae count and match quality, while traditional photography could not always capture enough high-quality minutiae for comparisons, even after digital enhancement.  相似文献   
607.
Journal of Youth and Adolescence - Sexual orientation disparities in suicide behavior are well-documented. Yet, few studies have examined how developmental assets – key values,...  相似文献   
608.
Abstract

In the 1970s magazines, journals and periodicals constituted an alternative public sphere for second wave feminism. These publications provide an index—and at times the only documentation—of the activities of the women’s art movement as well as its many iterations and divisions. This article addresses this imbalance, arguing that Heresies: A Feminist Publication on Art and Politics (1977–1992) was exemplar of the radical political challenge feminism posed to the art world and culture more broadly. Launched in 1977 by the Heresies mother collective, which included Joan Braderman, Mary Beth Edelson, Lucy R. Lippard, Harmony Hammond and May Stevens among others, the magazine had thematic issues edited by different collectives and was comprised of material from an open call. Content ranged from poetry, to academic essays, to artworks both original and reproduced. This article considers the collaborative process of producing the magazine, which attempted to be inclusive, but in fact came to mirror the divisions—as well as political investments—of the broader women’s movement, alongside the dissensus the publication provoked and attempted to confront.  相似文献   
609.
When do campaign contributions matter? This article advances the claim that a group that gives campaign contributions to US Members of Congress is more likely to achieve legislative success when (1) a single legislator can deliver to the group (2) a private benefit (3) without attracting negative attention. Using an original data set based on the written comments of nearly 900 interest groups lobbying the US Senate Finance Committee on health reform legislation in 2009, I link group requests to corresponding legislation. The analysis shows a significant relationship between lobby groups' campaign contributions and their legislative success, and at distinct units of analysis—the group, the side, and the group-senator dyad. The relationship is particularly strong in predicting senators’ amendments in committee. The rare data presented here offer compelling evidence that interest groups' legislative victories are sometimes connected to campaign contributions in a way that previous studies could not identify.  相似文献   
610.
Amy Oakes 《安全研究》2013,22(3):431-463
The idea of “least likely” (or “hard”) and “most likely” cases with which to test theories has been addressed in many prominent works on qualitative methodology. Such research designs are especially common among those working in the field of security studies. Nevertheless, there exists considerable confusion regarding how these cases should be defined and how authors can draw sound inferences from them. At worst, such confusion leads to the impression that researchers apply the labels of least and most likely cases in an arbitrary fashion. This article advances two related rationales for categorizing cases as least or most likely, describing the necessary steps researchers should follow to employ them correctly. It incorporates literature from security studies to demonstrate the pitfalls that researchers may be vulnerable to without a precise idea of how least and most likely cases should be used.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号