首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   145篇
  免费   3篇
各国政治   2篇
工人农民   7篇
世界政治   5篇
外交国际关系   1篇
法律   48篇
中国政治   11篇
政治理论   4篇
综合类   70篇
  2024年   1篇
  2021年   4篇
  2020年   3篇
  2019年   3篇
  2018年   3篇
  2017年   3篇
  2016年   1篇
  2015年   3篇
  2014年   9篇
  2013年   15篇
  2012年   4篇
  2011年   10篇
  2010年   5篇
  2009年   7篇
  2008年   10篇
  2007年   12篇
  2006年   11篇
  2005年   5篇
  2004年   11篇
  2003年   9篇
  2002年   4篇
  2001年   8篇
  2000年   1篇
  1999年   1篇
  1997年   1篇
  1986年   1篇
  1984年   1篇
  1983年   2篇
排序方式: 共有148条查询结果,搜索用时 15 毫秒
51.
Youth reporting independently elevated levels of religiosity and self-efficacy tend to abstain from externalizing behavior. However, little is known about the ways in which religiosity and self-efficacy interrelate to impact youth externalizing. Drawing from a sample of African American youth from public housing communities (N = 236), we use latent profile analysis to identify subtypes of youth based on self-reported religiosity and self-efficacy and, in turn, examine links with crime. Compared to youth in other subgroups, those classified as both highly religious and highly self-efficacious reported less involvement in minor and severe delinquency, but not violence.  相似文献   
52.
The analysis of parliamentary debates is at the confluence of a number of developments in political science. What light can automated and semi‐automated techniques throw on such analysis? In this paper we compare two such approaches, one semi‐automated (Hamlet) and the other fully automated (Alceste). We use both approaches to identify the prominent themes in debate and to assess how far speakers who favour different positions adopt a distinct pattern of discourse. We seek to assess how far the two approaches yield convergent or divergent analyses. Selecting a second reading debate from the UK House of Commons on a private member's bill on abortion in July 1966, we are able to show similarities of analysis despite the detailed differences between the two approaches. In particular, the analysis in Hamlet al.lows identification of the extent to which individual speakers employ one type of vocabulary rather than another. Alceste is able to provide a statistical basis for the different classes of vocabulary that occur in the debate. However, the two programs rest upon quite different assumptions about the relationship between syntax and meaning, with implications for the practice of political science.  相似文献   
53.
目前,计算机网络犯罪十分严重,已成为不可忽视的社会问题。我国应制定更为系统的法律,为治理计算机网络犯罪提供必要的法律保障。  相似文献   
54.
The use of a scanner to control the photography of fingerprints, shoeprints and other trace contacts which fluoresce under irradiation from an argon ion laser is described. This scanner has been built to cover areas varying in size from a single fingerprint to a shoeprint and provides for variable speed, step size and angle of radiation which are all very important in this highly specialised area of photography.  相似文献   
55.
This article addresses and analyses the issues concerning the ownership of computer generated works within patents and copyright, and concludes that the current regime is woefully inadequate to deal with the growing use of more and more intuitive artificial intelligence systems in the production of such works. It considers the respective claims of interested parties to such rights before moving on to a consideration of the creation of a new legal personality to which such rights could be granted to resolve the difficulties inherent in the current system.  相似文献   
56.
LGBQ youth are more likely to consider, plan, and/or attempt suicide compared to their heterosexual peers. Evidence from the general population suggests that risky behaviors, like suicide, may be mediated by protective factors, including social support and self-efficacy. Using Agnew’s general strain theory and data from a statewide probability sample, the results of this study suggest that victimization, as a source of strain, is a risk factor for both LGBQ and heterosexual youth suicidality. While social support and self-efficacy reduce the risk of suicidality among heterosexual youth, they are not significant protective factors for LGBQ youth. Theoretical and policy implications are discussed.  相似文献   
57.
计算机犯罪及电子证据问题   总被引:3,自引:0,他引:3  
随着计算机技术及计算机网络的应用日趋广泛,涉及计算机的犯罪也越发严重且形式多样。以计算机及其网络为依托的电子数据在证明案件事实的过程中起着重要的作用。应尽快明晰电子数据在计算机犯罪中作为证据使用的相关法律问题。  相似文献   
58.
Computer-assisted skull identification system using video superimposition   总被引:1,自引:0,他引:1  
This system consists of two main units, namely a video superimposition system and a computer-assisted skull identification system. The video superimposition system is comprised of the following five parts: a skull-positioning box having a monochrome CCD camera, a photo-stand having a color CCD camera, a video image mixing device, a TV monitor and a videotape recorder. The computer-assisted skull identification system is composed of a host computer including our original application software, a film recorder and a color printer. After the determination of the orientation and size of the skull to those of the facial photograph using the video superimposition system, the skull and facial photograph images are digitized and stored within the computer, and then both digitized images are superimposed on the monitor. For the assessment of anatomical consistency between the digitized skull and face, the distance between the landmarks and the thickness of soft tissue of the anthropometrical points are semi-automatically measured on the monitor. The wipe images facilitates the comparison of positional relationships between the digitized skull and face. The software includes the polynomial functions and Fourier harmonic analysis for evaluating the match of the outline such as the forehead and mandibular line in both the digitized images.  相似文献   
59.
计算机犯罪是现代社会一种危害极大的新型犯罪。文章对计算机非法文件的检验方式方法进行研究 ,提出相关的侦查方法 ,有效的防范和打击犯罪分子。  相似文献   
60.
试论安全审计对计算机犯罪的追踪取证   总被引:2,自引:0,他引:2  
当前计算机犯罪日益严重,计算机网络中安全审计系统能事前控制人员或设备的访问行为,并能事后获得直接电子证据,充分利用安全审计功能是对计算机犯罪进行追踪取证的有效方法。而安全审计的策略、措施直接影响审计效果。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号