全文获取类型
收费全文 | 4521篇 |
免费 | 33篇 |
专业分类
各国政治 | 75篇 |
工人农民 | 90篇 |
世界政治 | 126篇 |
外交国际关系 | 320篇 |
法律 | 2111篇 |
中国共产党 | 46篇 |
中国政治 | 434篇 |
政治理论 | 470篇 |
综合类 | 882篇 |
出版年
2025年 | 1篇 |
2024年 | 56篇 |
2023年 | 87篇 |
2022年 | 74篇 |
2021年 | 79篇 |
2020年 | 172篇 |
2019年 | 121篇 |
2018年 | 131篇 |
2017年 | 181篇 |
2016年 | 168篇 |
2015年 | 104篇 |
2014年 | 232篇 |
2013年 | 402篇 |
2012年 | 301篇 |
2011年 | 287篇 |
2010年 | 203篇 |
2009年 | 269篇 |
2008年 | 266篇 |
2007年 | 278篇 |
2006年 | 244篇 |
2005年 | 220篇 |
2004年 | 179篇 |
2003年 | 139篇 |
2002年 | 109篇 |
2001年 | 85篇 |
2000年 | 49篇 |
1999年 | 29篇 |
1998年 | 11篇 |
1997年 | 4篇 |
1996年 | 5篇 |
1995年 | 20篇 |
1994年 | 3篇 |
1993年 | 3篇 |
1992年 | 8篇 |
1991年 | 3篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1987年 | 6篇 |
1986年 | 8篇 |
1985年 | 3篇 |
1984年 | 3篇 |
1983年 | 3篇 |
排序方式: 共有4554条查询结果,搜索用时 0 毫秒
121.
This article examines how the British press covered the debate around a prisoner's right to vote. It shows how Conservative ministers were put under pressure in early 2011 by newspapers on the right of the political spectrum to abandon proposals to end the ‘blanket ban’ on a prisoner's right to vote. Modification of the ban could have brought the UK into compliance with treaty obligations linked to the European Convention on Human Rights (ECHR) and judgments of the European Court. The focus of the debate, both in parliament and in the newspapers, was on sovereignty and judicial interference. Our research shows that very little of the media debate on a prisoner's right to vote was about human rights. Instead, outrage on the issue of prisoners' rights was linked to opposition to pro‐Europeans within the coalition government and demands for a radical shake‐up in Britain's relationship with the European Union (EU). The reform of human rights legislation and breaking the link with the European Convention is likely to be a centrepiece of Conservative policy at the next general election. The article is based on qualitative research of newspaper coverage in the period between February and mid‐April 2011 when the prisoners' rights' issue came to the fore, and audience reception studies involving focus groups. 相似文献
122.
Using stochastic methods we illustrate that the Provisional Irish Republican Army's (PIRA) network is clustered along three primary dimensions: (a) brigade affiliation, (b) whether the member participated in violent activities, and (c) task/role within PIRA. While most brigades tended to foster connections within the brigade (that is, “closure”), the tendency to do so varied across the organization. Members who engaged with violent activities were far more likely to connect with each other; in later periods there is polarization into those who engage in violent activities and those who do not. Across brigades, those who engage in a particular task and role (improvised explosive device [IED] constructor, IED planter, gunman, robber/kidnapper/drug smuggler/hijacker) are more likely to connect with others who do the same task or play the same role than with other members who fulfill other roles. Standard forms of homophily (that is, the tendency to make connections with people who are similar in terms of demography or status) play a very weak role in explaining which members interact with one another. Finally, our analysis illustrates clear patterns of relational change that correspond to changes in the formal structures that PIRA's leadership promoted. 相似文献
123.
Why do imposed democracies endure and how do policy choices by imposing states affect durability? To study these questions, we formulate expectations linking durability to structural domestic conditions, the level of domestic security in the state into which a polity is imposed, the policies of imposing states, and the regional environment within which an imposed democracy is nested. We use event history to test our expectations on a sample of democracies imposed during the twentieth century. We find that relatively immutable, structural conditions, such as ethnic cleavages, economic development, and prior democratic experience strongly influence the durability of imposed democracies. While some policy choices made by imposing states can impact the survival of imposed democracy, they do so only modestly relative to the environment in which a democracy is imposed. 相似文献
124.
K. Amber Curtis 《国际相互影响》2014,40(3):402-430
When and how will personal financial (aka “pocketbook”) concerns drive citizens’ political decisions? Scholars remain puzzled by the mismatch between the expectation that pocketbook voting should occur and the reality that, according to most findings, it usually does not. Using original survey data collected immediately after Iceland’s second “Icesave” referendum (2011), I first report the results of an embedded experiment that successfully evokes greater pocketbook concern. Next, I analyze the determinants of retrospective pocketbook evaluations, showing that priming effects are conditioned by political sophistication such that high sophisticates are among the most likely to report negative economic assessments. I then turn to the consequences of these egocentric views for government approval. Mediation analysis confirms a significant indirect effect, suggesting that subjective pocketbook evaluations exert a strong influence on political attitudes that has been hidden in prior work. Results illuminate the contextual, cognitive, and causal circumstances under which pocketbook effects transpire and suggest new ways in which self-interest might matter for attitudes toward international political economy issues. 相似文献
125.
Desmond Ellis 《Family Court Review》2015,53(4):650-662
This article critically evaluates the recommendation that family court–based mandatory mediation incorporated in a tiered service delivery model be replaced by a mandatory screening process incorporated in a stepping stones triage model in which couples are matched with an appropriate conflict resolution proceeding. My conclusion is that implementation of this recommendation should be made contingent upon the willingness of its advocates to address concerns with the safety, process, and objectives as described herein.
- Key Points for the Family Court Community:
- Domestic violence screening should be incorporated in the larger triadic process of screening–risk assessment–risk management.
- A Safety First Rule should be followed in screening couples into or out of conflict resolution proceedings.
- Screening decisions must be grounded in an empirically validated method of matching couples with appropriate conflict resolution proceedings.
- Causal mechanisms must be included as items in any risk assessment instrument used in family courts.
126.
Android operating system has the highest market share in 2014; making it the most widely used mobile operating system in the world. This fact makes Android users the biggest target group for malware developers. Trend analyses show large increase in mobile malware targeting the Android platform. Android's security mechanism is based on an instrument that informs users about which permissions the application needs to be granted before installing them. This permission system provides an overview of the application and may help gain awareness about the risks. However, we do not have enough information to conclude that standard users read or digital investigators understand these permissions and their implications. Digital investigators need to be on the alert for the presence of malware when examining Android devices, and can benefit from supporting tools that help them understand the capabilities of such malicious code. This paper presents a permission-based Android malware detection system, APK Auditor that uses static analysis to characterize and classify Android applications as benign or malicious. APK Auditor consists of three components: (1) A signature database to store extracted information about applications and analysis results, (2) an Android client which is used by end-users to grant application analysis requests, and (3) a central server responsible for communicating with both signature database and smartphone client and managing whole analysis process. To test system performance, 8762 applications in total, 1853 benign applications from Google's Play Store and 6909 malicious applications from different sources were collected and analyzed by the system developed. The results show that APK Auditor is able to detect most well-known malwares and highlights the ones with a potential in approximately 88% accuracy with a 0.925 specificity. 相似文献
127.
Edward M. Suzuki Ph.D. 《Journal of forensic sciences》2014,59(5):1205-1225
Bismuth oxychloride (BiOCl) was the first viable synthetic pearl pigment developed 50 years ago. It was only used for a limited time period in automotive paint (model years 1998–2000), serving to produce luster for a single Chrysler black metallic color. Identification of this pigment in an unknown automotive paint can thus facilitate determination of the vehicle of origin. Bismuth oxychloride imparts effects similar to those produced by silver/white mica pearlescent pigments, and such a pigment was used together with bismuth oxychloride in at least one original equipment manufacturer (OEM) basecoat. Silver/white micas are now used primarily in white pearl tricoat systems. This article describes the identification of bismuth oxychloride and silver/white mica pearlescent pigments in automotive finishes using FT‐IR spectroscopy, X‐ray fluorescence (XRF) spectrometry, and SEM/EDS analysis. Data for some cadmium pigments, which were used in automotive paint several decades ago, are also presented as they produce infrared absorptions similar to that of bismuth oxychloride. 相似文献
128.
KATIE DHINGRA DANIEL BODUSZEK SUSANNA KOLA‐PALMER 《The Howard Journal of Crime and Justice》2015,54(3):237-249
This study aimed to determine whether distinct subgroups of psychopathic traits exist in a sample of civil psychiatric patients, using data from the MacArthur Violence Risk Assessment Project (n = 810), by means of latent class analysis. Multinomial logistic regression was used to interpret the nature of the latent classes, or groups, by estimating the associations with criminal behaviour, violence, and gender. The best fitting latent class model was a 4‐class solution: a ‘high psychopathy class’ (class 1; 26.4%), an ‘intermediate psychopathy class’ (class 2; 16.0%), a ‘low affective‐interpersonal and high antisocial‐lifestyle psychopathy class’ (class 3; 31.3%), and a ‘normative class’ (class 4; 26.3%). Each of the latent classes was predicted by differing external variables. Psychopathy is not a dichotomous entity, rather it falls along a skewed continuum that is best explained by four homogenous groups that are differentially related to gender, and criminal and violent behaviour. 相似文献
129.
Marcel de Puit Ph.D. Mahado Ismail B.Sc. Xiaoma Xu Ph.D. 《Journal of forensic sciences》2014,59(2):364-370
The analysis of amino acids present in fingerprints has been studied several times. In this paper, we report a method for the analysis of amino acids using an fluorenylmethyloxycarbonyl chloride‐derivatization for LC separation and MS detection. We have obtained good results with regard to the calibration curves and the limit of detection and LOQ for the target compounds. The extraction of the amino acids from the substrates used proved to be very efficient. Analysis of the derivatized amino acids enabled us to obtain full amino acid profiles for 20 donors. The intervariability is as expected rather large, with serine as the most abundant constituent, and when examining the total profile of the amino acids per donor, a characteristic pattern can be observed. Some amino acids were not detected in some donors, or fell out of the range of the calibration curve, where others showed a surprisingly high amount of material in the deposition analyses. Further investigations will have to address the intravariability of the amino acid profiles of the fingerprints from donors. By the development of the analytical method and the application to the analysis of fingerprints, we were able to gain insight in the variability of the constituents of fingerprints between the donors. 相似文献
130.
A standard method for positive identification is the use of antemortem and postmortem radiographic comparisons. The purpose of this research is to test the visual accuracy of antemortem and postmortem radiographic comparisons of cranial vault outlines and to evaluate their uniqueness using geometric morphometric methods. A sample of 106 individuals with varying levels of education and forensic case experience participated in a visual accuracy test. Of the 106 individuals, only 42% correctly assigned all of the radiographs, with accuracy rates ranging from 70 to 93% for each radiographic comparison. Vault shape was further examined using elliptic Fourier analysis, and paired t‐tests were computed on the first 10 principal components accounting for 100% of the variance, which found no significant differences. The visual accuracy test and elliptic Fourier analysis shows that vault outlines may not be unique enough for positive identifications when used as a sole indicator. 相似文献