首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   251篇
  免费   12篇
各国政治   13篇
工人农民   21篇
世界政治   10篇
外交国际关系   10篇
法律   105篇
中国政治   5篇
政治理论   94篇
综合类   5篇
  2023年   1篇
  2021年   3篇
  2020年   5篇
  2019年   3篇
  2018年   9篇
  2017年   10篇
  2016年   11篇
  2015年   5篇
  2014年   6篇
  2013年   32篇
  2012年   12篇
  2011年   13篇
  2010年   8篇
  2009年   14篇
  2008年   12篇
  2007年   12篇
  2006年   11篇
  2005年   8篇
  2004年   10篇
  2003年   7篇
  2002年   9篇
  2001年   8篇
  2000年   9篇
  1999年   9篇
  1998年   5篇
  1997年   1篇
  1996年   4篇
  1995年   3篇
  1994年   2篇
  1993年   2篇
  1992年   1篇
  1991年   6篇
  1987年   3篇
  1986年   1篇
  1984年   2篇
  1983年   1篇
  1982年   1篇
  1979年   2篇
  1975年   1篇
  1972年   1篇
排序方式: 共有263条查询结果,搜索用时 31 毫秒
191.
192.
As part of the validation of the AmpFlSTR Profiler Plus short tandem repeat (STR) system, under reduced polymerase chain reaction (PCR) volume conditions (i.e., 25 microL), a total of 275 casework samples were processed. Examples of profiles are presented along with amplification conditions to improve the odds of obtaining balanced and complete profiles for samples showing partial results or profiles with a descending slope. Data collected and used to develop our interpretation guidelines are included. From the mixture studies, full profiles were obtained for minor contributors, using 2 ng of DNA, with ratios of 10:1 or 1:20 and using 1 ng of DNA, with ratios of 10:1 and 1:8. The specificity of the Profiler Plus amplification reaction performed in 25 microL was examined and confirmed using a large spectrum of nonhuman DNAs. This report supports the use of the AmpFlSTR Profiler Plus STR system for casework DNA typing under reduced PCR volume conditions.  相似文献   
193.
194.
195.
计算机犯罪证据刍议   总被引:1,自引:0,他引:1  
计算机犯罪证据的收集和处理是侦办计算机犯罪案件的关键和难点。计算机犯罪证据与传统证据形式相比有许多不同特点,但具体分析,我们仍可将其归入书证和物证的范畴,因此计算机犯罪证据具有证据能力。计算机犯罪证据的证明力并不强,必须与其他证据相配合才能定案。计算机犯罪证据的收集和处理与其证据能力和证明力密切相关,在这方面我们有必要借鉴发达国家的先进经验。  相似文献   
196.
197.
198.
Photographs taken by crime victims and perpetrators are at times important evidence. Their time of photography may also affect their value as such. Three methods of determining when a picture was taken by using the content of the picture are presented. The methods utilize solar direction-measured from shadows in the photograph, identifying flowering wild plants and correlating cloudiness with meteorological observations. Solar direction is the most accurate and involved method and therefore is the main part of this paper. A case using all three methods is described.  相似文献   
199.
The budget process is the primary means by which federal policymakers allocate resources. The failure of the budget to recognize and measure the full cost of federal programs encourages the Congress and president to skew resource allocation toward policies whose budgetary costs are underestimated. These "low-cost" policies often increase costs to taxpayers without providing taxpayers with benefits. Recent examples of this phenomenon are found in the "supervisory goodwill" cases. This article reviews these cases, the budgetary weaknesses they identify, the influence these weaknesses had on legislators, and the unnecessary costs for taxpayers that result from the supervisory goodwill policy. Specifically, the federal budget did not recognize the cost that would result from encouraging financial institutions to assume the assets and liabilities of insolvent savings and loans. The budget's recognition of costs failed a second time by not recording expenditures when the government abrogated its contracts with acquirers. Both actions raised costs to taxpayers unnecessarily. In addition to analyzing budgetary weaknesses and their potential costs, this article also reviews two proposed budgetary reforms that could address the budgetary failures highlighted by the supervisory goodwill cases.  相似文献   
200.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号