首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   760篇
  免费   48篇
各国政治   40篇
工人农民   33篇
世界政治   59篇
外交国际关系   77篇
法律   353篇
中国政治   4篇
政治理论   235篇
综合类   7篇
  2023年   7篇
  2022年   3篇
  2021年   12篇
  2020年   19篇
  2019年   24篇
  2018年   39篇
  2017年   42篇
  2016年   27篇
  2015年   22篇
  2014年   26篇
  2013年   119篇
  2012年   16篇
  2011年   26篇
  2010年   14篇
  2009年   20篇
  2008年   31篇
  2007年   37篇
  2006年   42篇
  2005年   19篇
  2004年   19篇
  2003年   16篇
  2002年   19篇
  2001年   13篇
  2000年   18篇
  1999年   14篇
  1998年   17篇
  1997年   13篇
  1996年   6篇
  1995年   9篇
  1994年   14篇
  1993年   11篇
  1992年   7篇
  1991年   11篇
  1990年   6篇
  1988年   8篇
  1987年   6篇
  1986年   6篇
  1985年   7篇
  1984年   9篇
  1983年   4篇
  1982年   5篇
  1980年   3篇
  1979年   2篇
  1977年   2篇
  1976年   6篇
  1975年   1篇
  1972年   1篇
  1971年   3篇
  1970年   1篇
  1966年   4篇
排序方式: 共有808条查询结果,搜索用时 15 毫秒
311.
This paper provides a review of recent investigations on the image processing techniques used to match spent bullets and cartridge cases. It is also, to a lesser extent, a review of the statistical methods that are used to judge the uniqueness of fired bullets and spent cartridge cases. We review 2D and 3D imaging techniques as well as many of the algorithms used to match these images. We also provide a discussion of the strengths and weaknesses of these methods for both image matching and statistical uniqueness. The goal of this paper is to be a reference for investigators and scientists working in this field.  相似文献   
312.
Abstract

Assessment and treatment of adults with learning disabilities who commit sexual offences presents a number of challenges. Much of the professional forensic and psychiatric literature on work with this group concentrates on the development of interventions based on theoretical models of sexual offending originating from the mainstream criminal justice system and have often been adapted and applied to people with learning disabilities. Currently, there is very little evidence to demonstrate the effectiveness or validity of the adaptation and application of mainstream models to this population. The efficacy of such adapted models used to describe sexual offending in people with learning disabilities clearly has an impact of any intervention informed by them. In particular, some researchers suggest that key factors such as cognitive distortions are evident in sexual offenders with learning disabilities; there is, however, no research relating to the prevalence of these or other key factors within the general population of people with learning disabilities. The present literature review highlights some of the clinical issues with a particular focus on the assessment of deviant sexual interest. Specifically, the literature is confused with inconsistencies relating to the definition of the group, the extent and nature of offending and a lack of standardized methodology for assessment and comparison. Consideration is given to the particular needs of this group and the implications for research and treatment.  相似文献   
313.
Commentators are divided on the electoral effect of constituency service, whether it provides unfair advantage or has limited electoral impact. The arrival of the Internet has added to this debate. This research note considers how pioneering MPs are using e-newsletters effectively to communicate their constituency service. A web-hosted survey of subscribers to two MPs' e-newsletters, with over 1,100 respondents, was conducted. The data suggest that receiving an MP's e-newsletter did have an effect on subscribers' voting behaviour at the 2005 General Election. Rather than something to fear, this vote-winning capacity of an e-newsletter may actually encourage MPs to have more dialogue between MPs and constituents.  相似文献   
314.
The ‘Historikerstreit’ in West Germany was opened by the non-historian Habermas who sought to expose what he saw as a ‘scandalous’ revision of aspects of the history of German fascism on the part of leading conservative historians like Nolte, Hillgruber and Stürmer. Habermas sees this revisionism in the wider context of the perceived need to foster a new German nationalism as a means of legitimation. The attempt to decontaminate German history would seem to derive from the need to resist the demands for political realignment in West Germany and to establish a strong pedigree of German anti-communism which takes in National Socialism and its membership of the Anti-Comintern Pact as well as West Germany's membership of NATO. Habermas's critique of conservative historians and the non-rational assumptions of their philosophy of history is essentially linked to his critique of Nietzsche, Heidegger, Derrida and Foucault and his identification of a common paralyzing influence on discourse.  相似文献   
315.
316.
This article considers how Klein’s argument for the use of a maritime framework for space warfare is buoyed by the consideration of deep space conflict both in application to terrestrial wars and in its own right. It describes the greater alignment of Corbett’s work with this deep space medium than with the orbital medium considered by Klein. Through this analysis, it suggests that possible futures need to consider the deep space medium, making Corbett/Klein’s model superior to other possible approaches.  相似文献   
317.
318.
This article argues that there is a close link between security sector reform (ssr) and state building. Focusing on UK approaches to state building and ssr, it argues that these are an extension of liberal models containing a number of assumptions about the nature of states and how they should be constructed and that any analysis of ssr approaches needs to be seen within a broader framework of the international community, which tends to see the replacement of ‘dysfunctional’ societies as desirable both for the people of those states and for the international community. As a result, state building has largely been carried out as a ‘technical-administrative’ exercise focusing on the technicalities of constructing and running organisations rather than on the politics of creating states, leading to a lack of overall political coherence in terms of where ssr is, or should be, going and of what kinds of state are being constructed. Politics is frequently cited by practitioners as representing a set of obstacles to be overcome to achieve ssr rather than a set of assumptions about actually doing it. The effect of development and security policies working closely together in insecure environments is an overarching emphasis on security at the expense of the harder, more long-term process of development.  相似文献   
319.
Background: Antisocial personality disorder (ASPD) is strongly associated with violence but the effects of other personality disorder (PD) categories are uncertain. Purpose: To investigate associations between 10 DSM-IV PD categories and effects of co-occurring disorders on self-reported violence. Method: Cross-sectional survey of 8397 adults aged 16–74 years in households in Great Britain. Results: ASPD contributed strongly to the burden of violence in the British population. Paranoid and obsessive–compulsive PD made additional independent contributions, and narcissistic PD contributed to intimate partner violence. The prevalence of violence correlated with the number of PD categories. Comorbid alcohol dependence further increased the risk. Conclusions: Risk of violence increases with increasing severity of PD, measured by the number of PD categories, and with co-occurring alcohol dependence. Not all PD categories are associated with violence, and avoidant PD was protective. Identification of targets for future interventions may be obscured using a classification based solely on severity.  相似文献   
320.
Counterfeit parts in the U.S. Department of Defense (DOD) supply chain threaten national security by compromising critical military operations and placing the lives of military service members at risk. With the goal of illustrating the nature of the risk as it relates to types of counterfeit parts, how they entered the supply chain, and were identified and processed through the criminal justice system, we assemble and analyze open-source information on criminal schemes involving counterfeits in the DOD supply chain. We utilize the Product Counterfeiting Database (PCD) to capture every indicted scheme linked to the DOD and describe characteristics of the schemes, offenders, and victims. These data provide empirical insights into the counterfeiting of parts and equipment in the DOD supply chain. We conclude with an overview of key issues to consider when weighing opportunities for product counterfeiting as well as implications for policy and practice.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号