首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   47篇
  免费   5篇
各国政治   2篇
世界政治   2篇
外交国际关系   6篇
法律   30篇
政治理论   12篇
  2022年   1篇
  2021年   1篇
  2020年   2篇
  2019年   4篇
  2018年   2篇
  2017年   2篇
  2016年   3篇
  2015年   1篇
  2014年   5篇
  2013年   11篇
  2012年   1篇
  2011年   2篇
  2010年   1篇
  2009年   1篇
  2008年   1篇
  2006年   1篇
  2005年   1篇
  2004年   2篇
  2003年   3篇
  2002年   1篇
  1999年   1篇
  1994年   1篇
  1993年   1篇
  1989年   1篇
  1980年   1篇
  1977年   1篇
排序方式: 共有52条查询结果,搜索用时 15 毫秒
21.
Researchers envisioned Storage as a Service (StaaS) as an effective solution to the distributed management of digital data. Cooperative storage cloud forensic is relatively new and is an under‐explored area of research. Using Symform as a case study, we seek to determine the data remnants from the use of cooperative cloud storage services. In particular, we consider both mobile devices and personal computers running various popular operating systems, namely Windows 8.1, Mac OS X Mavericks 10.9.5, Ubuntu 14.04.1 LTS, iOS 7.1.2, and Android KitKat 4.4.4. Potential artefacts recovered during the research include data relating to the installation and uninstallation of the cloud applications, log‐in to and log‐out from Symform account using the client application, file synchronization as well as their time stamp information. This research contributes to an in‐depth understanding of the types of terrestrial artifacts that are likely to remain after the use of cooperative storage cloud on client devices.  相似文献   
22.
Self‐embedding behavior (SEB) is the repeated insertion of sharp objects, such as needles or pins, into the soft tissues of abdomen, limbs, and other body parts. In this study, two cases of SEB were reported and the scientific worldwide literature reviewed. Thirty‐two cases of SEB were identified through systematic searches in the main bibliographic databases. Mean age was 35 years (SD = 8.97). Just over two‐thirds of the patients were female. Although the number of embedded objects could be as high as 200, major clinical and surgical complications were uncommon and mortality was null. Patients with SEB presented three major diagnoses: psychotic (25%), personality (21.9%), and factitious (28.1%) disorders. The practice of SEB largely went undetected as the patients themselves did not bring it to the attention of family members or physicians and usually denied they have engaged in SEB. A high level of suspicion is required to avoid a missed diagnosis.  相似文献   
23.
Single-nucleotide polymorphisms of Y chromosome (Y-SNPs) are a class of markers of interest in forensic investigations, because many of them show regional specificity, providing useful information about the geographic origin of a subject or evidence under investigation. A first multiplex with 7 SNPs (M35, M89, M9, M170, M172, M45, M173), which occur in the basal branches of the phylogenetic tree and are able to assign a subject to known most frequent European haplogroups, was designed. SNP genotyping was accomplished by hot-start PCR with primers amplifying fragments between 96 and 136 nucleotides, minisequencing, and capillary electrophoresis of extension products. Ninety seven subjects of known geographic provenance were studied, of which 68 from Europe. Of these, 57 had mutations found more frequently in European haplogroups and 11 more frequent in Asian populations. Subjects from non-European countries were also examined and had haplogroups common in their regions of provenance. Experiments with low molecular weight DNA gave positive amplification from 1 ng of DNA for all seven SNPs.  相似文献   
24.
25.
26.
27.
What explains the adoption of military innovations? In this article, we assess the empirical validity of adoption capacity theory by reconsidering one methodologically important case analyzed by Michael Horowitz: the diffusion of suicide terrorism. We show that, when addressing problems in Horowitz's research design, the case of suicide terrorism fails to support adoption capacity theory. We argue that, in order to account for the diffusion of this innovation, one needs to take into consideration the tactical incentives to overcome technologically superior enemies. The results of our quantitative and qualitative analyses suggest that terrorist groups fighting against very powerful states in terms of conventional capabilities are more likely to employ suicide attacks than those fighting against poorly equipped ones. Our findings are important because they provide systematic evidence in support of Kalyvas and Sànchez-Cuenca's argument that suicide terrorism is driven by tactical considerations and because they provide confidence in the external validity of Berman and Laitin's hardness of targets hypothesis. Our results also question Lyall and Wilson's finding that highly mechanized armies are inherently inadequate to win counterinsurgency operations. The superior conventional capabilities of a counterinsurgency army might in fact make traditional insurgent tactics ineffective and thus give insurgents an incentive to adopt suicide attacks.  相似文献   
28.
29.
30.
Material recovered from 374 fingerprints left by eleven laboratory workers on three different substrates (glass, wood, metal) at a standard pressure time of 30 s, with and without preliminary handwashing, was submitted to morphological, quantitative, and type analysis. Morphological and agarose-gel electrophoresis analysis showed that a non-negligible amount of epidermal corneal cells presented apoptotic alterations. The quantity of DNA recovered from fingerprints ranged between 0.04 to 0.2 ng, and in a significant number of experiments no DNA was detected. Handwashing reduced the amount of DNA recovered from fingerprints. The "shedder status" of the donor was a very important factor, causing inter-individual variations in the amount of DNA left by fingerprints. Spurious alleles from laboratory-based and secondary transfer contamination, stutters, and other artifacts described when analyzing low-copy-number DNA and capable of affecting correct profiles were observed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号