首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   261篇
  免费   9篇
各国政治   22篇
工人农民   8篇
世界政治   27篇
外交国际关系   12篇
法律   57篇
中国政治   2篇
政治理论   137篇
综合类   5篇
  2020年   5篇
  2018年   8篇
  2017年   7篇
  2016年   8篇
  2015年   4篇
  2014年   4篇
  2013年   31篇
  2012年   5篇
  2011年   4篇
  2010年   2篇
  2009年   4篇
  2008年   6篇
  2007年   7篇
  2006年   7篇
  2005年   3篇
  2004年   7篇
  2003年   6篇
  2002年   10篇
  2001年   4篇
  2000年   7篇
  1999年   2篇
  1998年   8篇
  1997年   3篇
  1996年   5篇
  1994年   6篇
  1993年   3篇
  1992年   8篇
  1991年   3篇
  1990年   5篇
  1989年   5篇
  1988年   3篇
  1986年   4篇
  1985年   5篇
  1984年   6篇
  1982年   2篇
  1981年   7篇
  1980年   3篇
  1979年   5篇
  1978年   6篇
  1977年   3篇
  1976年   2篇
  1975年   2篇
  1974年   5篇
  1973年   5篇
  1972年   3篇
  1970年   2篇
  1969年   3篇
  1968年   3篇
  1967年   3篇
  1966年   3篇
排序方式: 共有270条查询结果,搜索用时 0 毫秒
261.
During a hunt in Western Pomerania in January 1999 a wolf, injured at the left hind leg, was killed by a shot in the chest region. It was a 2-year-old male that probably came to Germany from Poland by crossing the Oder River. The hunter was reported to the police afterwards, because there were doubts as to the legality of the lethal shot. The hunter pleaded relief by reason of section 22 a German Hunting Law (prevention of avoidable pain or suffering of wild animals). After the shooting there was a number of wrong expert statements by a veterinarian and two zoologists concerning the age of the injury on the left hind leg and the direction of the shot to the chest region, which were corrected by subsequent medico-legal examinations performed on the order of the prosecution.  相似文献   
262.
Guterl F 《Newsweek》2002,140(20):50-51
  相似文献   
263.
264.
Recently, there has been considerable excitement about the economic potential of the “developmental network state”—decentralized government policies that successfully accelerated growth in several high- and medium-income countries. The question remains whether such a strategy could be successful in less-developed nations whose scientific and technological resources were relatively limited. This paper analyzes the trajectory of Chile, a Southern country which, despite adverse conditions, managed to produce something akin to an economic miracle during the last few decades. Our argument is that Chile’s success was based on the developmental network state strategy. Moreover, we highlight the centrality to understanding the Chilean experience of the concept of “network failures”—a common phenomenon that occurs when domestic production would be best served by network forms of organization but for a variety of reasons, these networks either fail to materialize or fail to take hold (Schrank and Whitford 2011). Over and over again, we see that the logic behind the actions of the Chilean state was to provide resources that reduced the likelihood of network failures. We examine three case studies of successful export sectors: salmon; wine; and fruit and vegetables. The paper outlines some of the challenges faced by the Chilean model and assesses its long-term viability.  相似文献   
265.
266.
The changing agricultural sector and the challenges faced by smallholders call for the need for farm mechanisation suited to smallholder farming. Conventional four-wheeled tractors (4WTs) are not feasible for many smallholders owing to their high capital costs, unsuitability for fragmented holdings as well as topography and slope. More appropriate technologies are needed such as two-wheeled tractors (2WTs) and their requisite accessories. Our findings show that opportunities exist for the introduction of 2WTs in maize based systems through service provider models combining a number of operations that can be offered throughout the year and targeted to niche areas where 4WT access is unlikely. The paper also suggests that attention needs to be given concurrently to development of the 2WT supply chain to ensure that its profitability is sustainable.  相似文献   
267.
In forensic voice comparison, deep learning has become widely popular recently. It is mainly used to learn speaker representations, called embeddings or embedding vectors. Speaker embeddings are often trained using corpora mostly containing widely spoken languages. Thus, language dependency is an important factor in automatic forensic voice comparison, especially when the target language is linguistically very different from that the model is trained on. In the case of a low-resource language, developing a corpus for forensic purposes containing enough speakers to train deep learning models is costly. This study aims to investigate whether a model pre-trained on multilingual (mostly English) corpus can be used on a target low-resource language (here, Hungarian), not represented by the model. Often multiple samples are not available from the offender (unknown speaker). Samples are therefore compared pairwise with and without speaker enrollment for suspect (known) speakers. Two corpora are used that were developed especially for forensic purposes and a third that is meant for traditional speaker verification. Speaker embedding vectors are extracted by the x-vector and ECAPA-TDNN techniques. Speaker verification was evaluated in the likelihood-ratio framework. A comparison is made between the language combinations (modeling, LR calibration, and evaluation). The results were evaluated by Cllrmin and EER metrics. It was found that the model pre-trained on a different language but on a corpus with a significant number of speakers can be used on samples with language mismatch. Sample duration and speaking style also seem to affect the performance.  相似文献   
268.
Scholars suggest that consumers rely on heuristics to evaluate products. They employ both extrinsic and intrinsic cues to evaluate product quality and utilize the same cues to differentiate between counterfeit and genuine products. This has far-reaching public health, economic, product authentication, and even criminal justice policy implications due to the emerging ideas of criminalizing the purchase of counterfeit goods. In order to predict the viability and the possible effects of such a policy, a thorough understanding of consumer attitudes toward counterfeits, purchase motivation, and behavior, as well as of their ability to distinguish between genuine and counterfeit goods, is imperative. Building on cue utilization theory, this article develops a framework for understanding how consumers develop and utilize heuristics for product authentication in the context of intellectual property infringements and outlines a research agenda. Additionally, it helps to inform the development of prevention and enforcement efforts, in consumer education and enforcement agent training, as well as a basis for policy decisions.  相似文献   
269.
Abstract

This article describes a follow-up study of 14 adolescent sexual offenders who had attended a community treatment programme. A core component of their treatment included outdoor wilderness group therapy. Interviews were conducted with adolescents and parents and tapped several areas including social skills and peer relationships, victim empathy, cognitive distortions, safety plans and coping with high risk situations, sexual offending cycle, perceived level of risk, intimacy and sexuality. The study also examined the child protection service records of the It adolescents. Data from child protection service computer records showed that none of the adolescents had reoffended. Interviews with adolescents and families focusing particularly on the wilderness component of the programme showed positive changes.  相似文献   
270.
Egypt maintained a policy of antagonism at arm’s length toward Ethiopia throughout Husni Mubarak’s presidency. This pattern changed immediately following Mubarak’s ouster. The burst of rapprochement and diplomatic activism that took shape in the spring of 2011 signaled a fundamental shift in the content and form of Egyptian policy vis-à-vis Ethiopia, which was reflected in President Muhammad Mursi’s reluctance to respond belligerently to Ethiopian initiatives 2 years later that threatened to diminish the northward flow of the Nile. Cairo’s evident restraint during the Mursi era cannot be explained by a change in the strategic circumstances that confronted Egyptian policy-makers. A more promising explanation can be found in a reformulation of desecuritization theory, which highlights the internal dynamics whereby potentially dangerous aspects of a country’s external environment get transformed into matters of routine political contestation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号