首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   447篇
  免费   8篇
各国政治   30篇
工人农民   1篇
世界政治   55篇
外交国际关系   12篇
法律   168篇
中国政治   9篇
政治理论   180篇
  2020年   3篇
  2019年   3篇
  2018年   3篇
  2015年   3篇
  2014年   4篇
  2013年   26篇
  2012年   15篇
  2011年   17篇
  2010年   15篇
  2009年   17篇
  2008年   23篇
  2007年   21篇
  2006年   19篇
  2005年   9篇
  2004年   4篇
  2003年   11篇
  2002年   7篇
  2000年   3篇
  1999年   7篇
  1998年   4篇
  1997年   10篇
  1996年   15篇
  1995年   13篇
  1994年   7篇
  1993年   9篇
  1992年   9篇
  1991年   12篇
  1990年   11篇
  1989年   16篇
  1988年   11篇
  1987年   13篇
  1986年   5篇
  1985年   5篇
  1984年   11篇
  1983年   8篇
  1982年   8篇
  1981年   3篇
  1980年   5篇
  1979年   10篇
  1978年   7篇
  1977年   3篇
  1976年   4篇
  1975年   3篇
  1974年   3篇
  1973年   4篇
  1970年   4篇
  1967年   4篇
  1966年   3篇
  1960年   3篇
  1959年   2篇
排序方式: 共有455条查询结果,搜索用时 15 毫秒
91.
Uncertainty is a hallmark of conflict behavior, and other forms of violence that accompany civil and international war—such as low-intensity warfare, guerrilla, insurgency, and asymmetric conflict—are no exception. This study applied the theory of political uncertainty and complexity theory to the analysis of conflict events during the first three years of the second Iraq war, 2003–2006, limited to the Diyala province. Findings show that neither the time between attacks T or the severity of attacks S (fatalities) have the “normal” (bell-shaped) or lognormal distribution that is characteristic of equilibrium systems. Instead, both variables showed heavy tails, symptomatic of non-equilibrium dynamics, in some cases approximating a power law with critical or near critical exponent value of 2. The empirical hazard force analysis in both cases showed that the intensity was high for the first epoch in both variables (March 2003 to June 2004) but even higher in the latter period from July 2004 to March 2006. Selected policy implications are discussed, including the possibility that real-time or near real-time analysis of the data analyzed through the uncertainty-complexity computational methods would have revealed the gathering momentum of adversarial attacks perhaps in time to have prevented the insurgency.  相似文献   
92.
The aim of this study is to analyze the process by which Al Qaeda has sought to co-opt essentially localized struggles in Southeast Asia into an evolving network of worldwide jihad. The article illustrates how, long before it was appropriate to speak of an entity called Al Qaeda, Islamists have been thinking transnationally since the 1980s. The argument attempts to piece together available evidence to reveal a plausible explanation of the origins, growth and direction of the main Islamist grouping in Southeast Asia, Jemaah Islamiyah, and its deepening relationship with Al Qaeda. The article suggests that the roots of a Southeast Asian terror network can be traced to two geographically separate ethno-religious struggles in the Philippines and Indonesia. The analysis demonstrates that these guerrilla groups orchestrating their distinct struggles were eventually combined through the auspices of Al Qaeda and the globalized franchising opportunities it exploited from the early 1990s.‐  相似文献   
93.
94.
95.
96.
97.
98.
99.
100.
The career model reappears with some consistency in the history of criminology. It consistently fails, however, to organize the facts about crime in a meaningful way. As a consequence, we predict that criminology will once again abandon career models in favor of theories of crime.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号