首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   492篇
  免费   22篇
各国政治   41篇
工人农民   61篇
世界政治   34篇
外交国际关系   38篇
法律   179篇
中国共产党   7篇
中国政治   8篇
政治理论   129篇
综合类   17篇
  2023年   5篇
  2022年   4篇
  2021年   13篇
  2020年   10篇
  2019年   17篇
  2018年   14篇
  2017年   29篇
  2016年   23篇
  2015年   10篇
  2014年   17篇
  2013年   123篇
  2012年   11篇
  2011年   21篇
  2010年   17篇
  2009年   18篇
  2008年   8篇
  2007年   25篇
  2006年   18篇
  2005年   21篇
  2004年   13篇
  2003年   14篇
  2002年   14篇
  2001年   9篇
  2000年   7篇
  1999年   5篇
  1998年   7篇
  1997年   4篇
  1996年   3篇
  1995年   3篇
  1993年   2篇
  1992年   6篇
  1991年   4篇
  1990年   1篇
  1989年   2篇
  1988年   2篇
  1987年   2篇
  1986年   1篇
  1985年   2篇
  1984年   1篇
  1983年   1篇
  1982年   3篇
  1979年   2篇
  1972年   1篇
  1966年   1篇
排序方式: 共有514条查询结果,搜索用时 31 毫秒
151.
科技革命促使人们交往手段的变革.交往是实践活动中不可缺少的部分,它有共同的内在结构和变革机制.从交往的价值论观点看,交往是有价值负荷的,从交往的实践论观点看,交往推进了信息技术的革命,从交往的产权变革看,科技革命推进了经济交往手段的变革,从而促进了社会经济的发展.  相似文献   
152.
153.
154.
Stalking has received a great deal of attention from the media and its harmful effects on victims have been well documented. Stalking is also more common than previously thought, leading researchers to classify stalkers into groups in an attempt to predict future behavior. Previous research has grouped stalkers based on theoretical models rather than trying to empirically examine stalking behaviors along with other factors such as motivation, type of relationship, and attachment style in determining a typology of stalkers. Female college students (N = 108) who had experienced stalking behaviors responded to questions regarding their perceptions of those behaviors. First, these victim perceptions were factor analyzed. Then, cluster analysis grouped those factors to produce a four-cluster typology of stalkers. Cluster 1 (Harmless) appeared to reflect a more casual, less jealous pattern of behavior. Cluster 2 (Low Threat) appeared the least likely to become physically violent or threatening, or to engage in illegal behaviors. Cluster 3 (Violent Criminal) appeared to be the most likely to engage in physically threatening and illegal behaviors. Cluster 4 (High Threat) was characterized by a more serious type of relationship and may attempt to be more restrictive of their partner when first meeting them.  相似文献   
155.
Occupational exposure biological monitoring techniques were applied for the diagnosis of inhalation abuse and for the evaluation of the levels of exposure to benzene, toluene, ethylbenzene, xylenes, and n-hexane, in 44 Tunisian adolescents and children suspected for volatile substance addiction. Urinary trans,trans-muconic acid, hippuric acid (HA), mandelic acid, and methylhippuric acids determinations were performed by high performance liquid chromatography with a photodiode array detector, and urinary o-cresol (o-Cr) and 2,5-hexanedione (HD) were extracted simultaneously and measured using gas chromatography with a flame ionization detector. Given the high linearity ranges, HD and o-Cr occupational exposure monitoring techniques could be applied without modification. However, urinary sample dilution was necessary before HA analysis. Concentrations were compared with the maxima of normal values (MNVs) in the general population and to the biological exposure indices (BEIs) used in occupational toxicology. Values as high as 6610-fold the MNV and 68 times the BEI were registered. The subjects showed high exposure to toluene and hexane. Measured metabolites HA and/or o-Cr and HD enabled the easy detection and evaluation of exposure levels. The problem of inhalant abuse should be given more attention and treated through an effective prevention strategy.  相似文献   
156.
Journal of Experimental Criminology - To test whether normative and non-normative forms of obligation to obey the police are empirically distinct and to assess whether they exhibit different...  相似文献   
157.
158.
159.
Where does British open source intelligence (OSINT) fit into the intelligence debate surrounding Allied knowledge of the Holocaust? In particular what can this source of intelligence tell us in regards to the opening of the extermination phase of the Holocaust in the Soviet Union? Were the Allies conclusions being falsely influenced by their own OSINT analysts? Or conversely did OSINT provide further evidence (alongside SIGINT decodes) that the Nazis were now committing mass genocide. This article explores these questions by examining the FRPS/FORD OSINT reports from the civilian ruled territories of (and those intended for) the Reichskommissariate Ostland and Ukraine.  相似文献   
160.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号