全文获取类型
收费全文 | 261篇 |
免费 | 9篇 |
专业分类
各国政治 | 22篇 |
工人农民 | 8篇 |
世界政治 | 27篇 |
外交国际关系 | 12篇 |
法律 | 57篇 |
中国政治 | 2篇 |
政治理论 | 137篇 |
综合类 | 5篇 |
出版年
2020年 | 5篇 |
2018年 | 8篇 |
2017年 | 7篇 |
2016年 | 8篇 |
2015年 | 4篇 |
2014年 | 4篇 |
2013年 | 31篇 |
2012年 | 5篇 |
2011年 | 4篇 |
2010年 | 2篇 |
2009年 | 4篇 |
2008年 | 6篇 |
2007年 | 7篇 |
2006年 | 7篇 |
2005年 | 3篇 |
2004年 | 7篇 |
2003年 | 6篇 |
2002年 | 10篇 |
2001年 | 4篇 |
2000年 | 7篇 |
1999年 | 2篇 |
1998年 | 8篇 |
1997年 | 3篇 |
1996年 | 5篇 |
1994年 | 6篇 |
1993年 | 3篇 |
1992年 | 8篇 |
1991年 | 3篇 |
1990年 | 5篇 |
1989年 | 5篇 |
1988年 | 3篇 |
1986年 | 4篇 |
1985年 | 5篇 |
1984年 | 6篇 |
1982年 | 2篇 |
1981年 | 7篇 |
1980年 | 3篇 |
1979年 | 5篇 |
1978年 | 6篇 |
1977年 | 3篇 |
1976年 | 2篇 |
1975年 | 2篇 |
1974年 | 5篇 |
1973年 | 5篇 |
1972年 | 3篇 |
1970年 | 2篇 |
1969年 | 3篇 |
1968年 | 3篇 |
1967年 | 3篇 |
1966年 | 3篇 |
排序方式: 共有270条查询结果,搜索用时 0 毫秒
261.
During a hunt in Western Pomerania in January 1999 a wolf, injured at the left hind leg, was killed by a shot in the chest region. It was a 2-year-old male that probably came to Germany from Poland by crossing the Oder River. The hunter was reported to the police afterwards, because there were doubts as to the legality of the lethal shot. The hunter pleaded relief by reason of section 22 a German Hunting Law (prevention of avoidable pain or suffering of wild animals). After the shooting there was a number of wrong expert statements by a veterinarian and two zoologists concerning the age of the injury on the left hind leg and the direction of the shot to the chest region, which were corrected by subsequent medico-legal examinations performed on the order of the prosecution. 相似文献
262.
263.
264.
Recently, there has been considerable excitement about the economic potential of the “developmental network state”—decentralized government policies that successfully accelerated growth in several high- and medium-income countries. The question remains whether such a strategy could be successful in less-developed nations whose scientific and technological resources were relatively limited. This paper analyzes the trajectory of Chile, a Southern country which, despite adverse conditions, managed to produce something akin to an economic miracle during the last few decades. Our argument is that Chile’s success was based on the developmental network state strategy. Moreover, we highlight the centrality to understanding the Chilean experience of the concept of “network failures”—a common phenomenon that occurs when domestic production would be best served by network forms of organization but for a variety of reasons, these networks either fail to materialize or fail to take hold (Schrank and Whitford 2011). Over and over again, we see that the logic behind the actions of the Chilean state was to provide resources that reduced the likelihood of network failures. We examine three case studies of successful export sectors: salmon; wine; and fruit and vegetables. The paper outlines some of the challenges faced by the Chilean model and assesses its long-term viability. 相似文献
265.
266.
The changing agricultural sector and the challenges faced by smallholders call for the need for farm mechanisation suited to smallholder farming. Conventional four-wheeled tractors (4WTs) are not feasible for many smallholders owing to their high capital costs, unsuitability for fragmented holdings as well as topography and slope. More appropriate technologies are needed such as two-wheeled tractors (2WTs) and their requisite accessories. Our findings show that opportunities exist for the introduction of 2WTs in maize based systems through service provider models combining a number of operations that can be offered throughout the year and targeted to niche areas where 4WT access is unlikely. The paper also suggests that attention needs to be given concurrently to development of the 2WT supply chain to ensure that its profitability is sustainable. 相似文献
267.
In forensic voice comparison, deep learning has become widely popular recently. It is mainly used to learn speaker representations, called embeddings or embedding vectors. Speaker embeddings are often trained using corpora mostly containing widely spoken languages. Thus, language dependency is an important factor in automatic forensic voice comparison, especially when the target language is linguistically very different from that the model is trained on. In the case of a low-resource language, developing a corpus for forensic purposes containing enough speakers to train deep learning models is costly. This study aims to investigate whether a model pre-trained on multilingual (mostly English) corpus can be used on a target low-resource language (here, Hungarian), not represented by the model. Often multiple samples are not available from the offender (unknown speaker). Samples are therefore compared pairwise with and without speaker enrollment for suspect (known) speakers. Two corpora are used that were developed especially for forensic purposes and a third that is meant for traditional speaker verification. Speaker embedding vectors are extracted by the x-vector and ECAPA-TDNN techniques. Speaker verification was evaluated in the likelihood-ratio framework. A comparison is made between the language combinations (modeling, LR calibration, and evaluation). The results were evaluated by Cllrmin and EER metrics. It was found that the model pre-trained on a different language but on a corpus with a significant number of speakers can be used on samples with language mismatch. Sample duration and speaking style also seem to affect the performance. 相似文献
268.
Scholars suggest that consumers rely on heuristics to evaluate products. They employ both extrinsic and intrinsic cues to evaluate product quality and utilize the same cues to differentiate between counterfeit and genuine products. This has far-reaching public health, economic, product authentication, and even criminal justice policy implications due to the emerging ideas of criminalizing the purchase of counterfeit goods. In order to predict the viability and the possible effects of such a policy, a thorough understanding of consumer attitudes toward counterfeits, purchase motivation, and behavior, as well as of their ability to distinguish between genuine and counterfeit goods, is imperative. Building on cue utilization theory, this article develops a framework for understanding how consumers develop and utilize heuristics for product authentication in the context of intellectual property infringements and outlines a research agenda. Additionally, it helps to inform the development of prevention and enforcement efforts, in consumer education and enforcement agent training, as well as a basis for policy decisions. 相似文献
269.
Ian Lambie Lisa Hickling Fred Seymour Les Simmonds Marlyn Robson Chanel Houlahan 《Journal of Sexual Aggression》2013,19(2):99-117
Abstract This article describes a follow-up study of 14 adolescent sexual offenders who had attended a community treatment programme. A core component of their treatment included outdoor wilderness group therapy. Interviews were conducted with adolescents and parents and tapped several areas including social skills and peer relationships, victim empathy, cognitive distortions, safety plans and coping with high risk situations, sexual offending cycle, perceived level of risk, intimacy and sexuality. The study also examined the child protection service records of the It adolescents. Data from child protection service computer records showed that none of the adolescents had reoffended. Interviews with adolescents and families focusing particularly on the wilderness component of the programme showed positive changes. 相似文献
270.
Fred H. Lawson 《Democracy and Security》2016,12(1):1-22
Egypt maintained a policy of antagonism at arm’s length toward Ethiopia throughout Husni Mubarak’s presidency. This pattern changed immediately following Mubarak’s ouster. The burst of rapprochement and diplomatic activism that took shape in the spring of 2011 signaled a fundamental shift in the content and form of Egyptian policy vis-à-vis Ethiopia, which was reflected in President Muhammad Mursi’s reluctance to respond belligerently to Ethiopian initiatives 2 years later that threatened to diminish the northward flow of the Nile. Cairo’s evident restraint during the Mursi era cannot be explained by a change in the strategic circumstances that confronted Egyptian policy-makers. A more promising explanation can be found in a reformulation of desecuritization theory, which highlights the internal dynamics whereby potentially dangerous aspects of a country’s external environment get transformed into matters of routine political contestation. 相似文献