首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4521篇
  免费   33篇
各国政治   75篇
工人农民   90篇
世界政治   126篇
外交国际关系   320篇
法律   2111篇
中国共产党   46篇
中国政治   434篇
政治理论   470篇
综合类   882篇
  2025年   1篇
  2024年   56篇
  2023年   87篇
  2022年   74篇
  2021年   79篇
  2020年   172篇
  2019年   121篇
  2018年   131篇
  2017年   181篇
  2016年   168篇
  2015年   104篇
  2014年   232篇
  2013年   402篇
  2012年   301篇
  2011年   287篇
  2010年   203篇
  2009年   269篇
  2008年   266篇
  2007年   278篇
  2006年   244篇
  2005年   220篇
  2004年   179篇
  2003年   139篇
  2002年   109篇
  2001年   85篇
  2000年   49篇
  1999年   29篇
  1998年   11篇
  1997年   4篇
  1996年   5篇
  1995年   20篇
  1994年   3篇
  1993年   3篇
  1992年   8篇
  1991年   3篇
  1990年   3篇
  1989年   2篇
  1988年   3篇
  1987年   6篇
  1986年   8篇
  1985年   3篇
  1984年   3篇
  1983年   3篇
排序方式: 共有4554条查询结果,搜索用时 0 毫秒
121.
    
This article examines how the British press covered the debate around a prisoner's right to vote. It shows how Conservative ministers were put under pressure in early 2011 by newspapers on the right of the political spectrum to abandon proposals to end the ‘blanket ban’ on a prisoner's right to vote. Modification of the ban could have brought the UK into compliance with treaty obligations linked to the European Convention on Human Rights (ECHR) and judgments of the European Court. The focus of the debate, both in parliament and in the newspapers, was on sovereignty and judicial interference. Our research shows that very little of the media debate on a prisoner's right to vote was about human rights. Instead, outrage on the issue of prisoners' rights was linked to opposition to pro‐Europeans within the coalition government and demands for a radical shake‐up in Britain's relationship with the European Union (EU). The reform of human rights legislation and breaking the link with the European Convention is likely to be a centrepiece of Conservative policy at the next general election. The article is based on qualitative research of newspaper coverage in the period between February and mid‐April 2011 when the prisoners' rights' issue came to the fore, and audience reception studies involving focus groups.  相似文献   
122.
Using stochastic methods we illustrate that the Provisional Irish Republican Army's (PIRA) network is clustered along three primary dimensions: (a) brigade affiliation, (b) whether the member participated in violent activities, and (c) task/role within PIRA. While most brigades tended to foster connections within the brigade (that is, “closure”), the tendency to do so varied across the organization. Members who engaged with violent activities were far more likely to connect with each other; in later periods there is polarization into those who engage in violent activities and those who do not. Across brigades, those who engage in a particular task and role (improvised explosive device [IED] constructor, IED planter, gunman, robber/kidnapper/drug smuggler/hijacker) are more likely to connect with others who do the same task or play the same role than with other members who fulfill other roles. Standard forms of homophily (that is, the tendency to make connections with people who are similar in terms of demography or status) play a very weak role in explaining which members interact with one another. Finally, our analysis illustrates clear patterns of relational change that correspond to changes in the formal structures that PIRA's leadership promoted.  相似文献   
123.
    
Why do imposed democracies endure and how do policy choices by imposing states affect durability? To study these questions, we formulate expectations linking durability to structural domestic conditions, the level of domestic security in the state into which a polity is imposed, the policies of imposing states, and the regional environment within which an imposed democracy is nested. We use event history to test our expectations on a sample of democracies imposed during the twentieth century. We find that relatively immutable, structural conditions, such as ethnic cleavages, economic development, and prior democratic experience strongly influence the durability of imposed democracies. While some policy choices made by imposing states can impact the survival of imposed democracy, they do so only modestly relative to the environment in which a democracy is imposed.  相似文献   
124.
    
When and how will personal financial (aka “pocketbook”) concerns drive citizens’ political decisions? Scholars remain puzzled by the mismatch between the expectation that pocketbook voting should occur and the reality that, according to most findings, it usually does not. Using original survey data collected immediately after Iceland’s second “Icesave” referendum (2011), I first report the results of an embedded experiment that successfully evokes greater pocketbook concern. Next, I analyze the determinants of retrospective pocketbook evaluations, showing that priming effects are conditioned by political sophistication such that high sophisticates are among the most likely to report negative economic assessments. I then turn to the consequences of these egocentric views for government approval. Mediation analysis confirms a significant indirect effect, suggesting that subjective pocketbook evaluations exert a strong influence on political attitudes that has been hidden in prior work. Results illuminate the contextual, cognitive, and causal circumstances under which pocketbook effects transpire and suggest new ways in which self-interest might matter for attitudes toward international political economy issues.  相似文献   
125.
    
This article critically evaluates the recommendation that family court–based mandatory mediation incorporated in a tiered service delivery model be replaced by a mandatory screening process incorporated in a stepping stones triage model in which couples are matched with an appropriate conflict resolution proceeding. My conclusion is that implementation of this recommendation should be made contingent upon the willingness of its advocates to address concerns with the safety, process, and objectives as described herein.
    Key Points for the Family Court Community:
  • Domestic violence screening should be incorporated in the larger triadic process of screening–risk assessment–risk management.
  • A Safety First Rule should be followed in screening couples into or out of conflict resolution proceedings.
  • Screening decisions must be grounded in an empirically validated method of matching couples with appropriate conflict resolution proceedings.
  • Causal mechanisms must be included as items in any risk assessment instrument used in family courts.
  相似文献   
126.
    
Android operating system has the highest market share in 2014; making it the most widely used mobile operating system in the world. This fact makes Android users the biggest target group for malware developers. Trend analyses show large increase in mobile malware targeting the Android platform. Android's security mechanism is based on an instrument that informs users about which permissions the application needs to be granted before installing them. This permission system provides an overview of the application and may help gain awareness about the risks. However, we do not have enough information to conclude that standard users read or digital investigators understand these permissions and their implications. Digital investigators need to be on the alert for the presence of malware when examining Android devices, and can benefit from supporting tools that help them understand the capabilities of such malicious code. This paper presents a permission-based Android malware detection system, APK Auditor that uses static analysis to characterize and classify Android applications as benign or malicious. APK Auditor consists of three components: (1) A signature database to store extracted information about applications and analysis results, (2) an Android client which is used by end-users to grant application analysis requests, and (3) a central server responsible for communicating with both signature database and smartphone client and managing whole analysis process. To test system performance, 8762 applications in total, 1853 benign applications from Google's Play Store and 6909 malicious applications from different sources were collected and analyzed by the system developed. The results show that APK Auditor is able to detect most well-known malwares and highlights the ones with a potential in approximately 88% accuracy with a 0.925 specificity.  相似文献   
127.
    
Bismuth oxychloride (BiOCl) was the first viable synthetic pearl pigment developed 50 years ago. It was only used for a limited time period in automotive paint (model years 1998–2000), serving to produce luster for a single Chrysler black metallic color. Identification of this pigment in an unknown automotive paint can thus facilitate determination of the vehicle of origin. Bismuth oxychloride imparts effects similar to those produced by silver/white mica pearlescent pigments, and such a pigment was used together with bismuth oxychloride in at least one original equipment manufacturer (OEM) basecoat. Silver/white micas are now used primarily in white pearl tricoat systems. This article describes the identification of bismuth oxychloride and silver/white mica pearlescent pigments in automotive finishes using FT‐IR spectroscopy, X‐ray fluorescence (XRF) spectrometry, and SEM/EDS analysis. Data for some cadmium pigments, which were used in automotive paint several decades ago, are also presented as they produce infrared absorptions similar to that of bismuth oxychloride.  相似文献   
128.
    
This study aimed to determine whether distinct subgroups of psychopathic traits exist in a sample of civil psychiatric patients, using data from the MacArthur Violence Risk Assessment Project (n = 810), by means of latent class analysis. Multinomial logistic regression was used to interpret the nature of the latent classes, or groups, by estimating the associations with criminal behaviour, violence, and gender. The best fitting latent class model was a 4‐class solution: a ‘high psychopathy class’ (class 1; 26.4%), an ‘intermediate psychopathy class’ (class 2; 16.0%), a ‘low affective‐interpersonal and high antisocial‐lifestyle psychopathy class’ (class 3; 31.3%), and a ‘normative class’ (class 4; 26.3%). Each of the latent classes was predicted by differing external variables. Psychopathy is not a dichotomous entity, rather it falls along a skewed continuum that is best explained by four homogenous groups that are differentially related to gender, and criminal and violent behaviour.  相似文献   
129.
    
The analysis of amino acids present in fingerprints has been studied several times. In this paper, we report a method for the analysis of amino acids using an fluorenylmethyloxycarbonyl chloride‐derivatization for LC separation and MS detection. We have obtained good results with regard to the calibration curves and the limit of detection and LOQ for the target compounds. The extraction of the amino acids from the substrates used proved to be very efficient. Analysis of the derivatized amino acids enabled us to obtain full amino acid profiles for 20 donors. The intervariability is as expected rather large, with serine as the most abundant constituent, and when examining the total profile of the amino acids per donor, a characteristic pattern can be observed. Some amino acids were not detected in some donors, or fell out of the range of the calibration curve, where others showed a surprisingly high amount of material in the deposition analyses. Further investigations will have to address the intravariability of the amino acid profiles of the fingerprints from donors. By the development of the analytical method and the application to the analysis of fingerprints, we were able to gain insight in the variability of the constituents of fingerprints between the donors.  相似文献   
130.
    
A standard method for positive identification is the use of antemortem and postmortem radiographic comparisons. The purpose of this research is to test the visual accuracy of antemortem and postmortem radiographic comparisons of cranial vault outlines and to evaluate their uniqueness using geometric morphometric methods. A sample of 106 individuals with varying levels of education and forensic case experience participated in a visual accuracy test. Of the 106 individuals, only 42% correctly assigned all of the radiographs, with accuracy rates ranging from 70 to 93% for each radiographic comparison. Vault shape was further examined using elliptic Fourier analysis, and paired t‐tests were computed on the first 10 principal components accounting for 100% of the variance, which found no significant differences. The visual accuracy test and elliptic Fourier analysis shows that vault outlines may not be unique enough for positive identifications when used as a sole indicator.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号