首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   458篇
  免费   32篇
工人农民   1篇
世界政治   3篇
外交国际关系   58篇
法律   288篇
中国共产党   3篇
中国政治   41篇
政治理论   6篇
综合类   90篇
  2023年   12篇
  2022年   4篇
  2021年   9篇
  2020年   21篇
  2019年   17篇
  2018年   14篇
  2017年   13篇
  2016年   20篇
  2015年   12篇
  2014年   25篇
  2013年   54篇
  2012年   25篇
  2011年   30篇
  2010年   25篇
  2009年   23篇
  2008年   36篇
  2007年   36篇
  2006年   31篇
  2005年   20篇
  2004年   18篇
  2003年   12篇
  2002年   10篇
  2001年   7篇
  2000年   5篇
  1999年   2篇
  1997年   2篇
  1996年   1篇
  1992年   2篇
  1990年   1篇
  1988年   1篇
  1985年   1篇
  1984年   1篇
排序方式: 共有490条查询结果,搜索用时 312 毫秒
71.
Detection of blood on dark materials is difficult for crime scene examiners so presumptive tests are used to assist. This study compared the ability of luminol, leuko crystal violet, tetramethylbenzidine, and Combur Test®E to detect whole, diluted blood (1:100) and a key‐shaped blood transfer stain (1:10), on dark cotton sheeting, tea towel, socks, synthetic carpet, and car mats. Powdered bleach was used to evaluate specificity of the blood detection tests. Sensitivity, specificity, positive predictive value (PPV), negative predictive value (NPV), and overall misclassification rate (OMR) assessed the quality of the blood tests. Luminol was the preferred test for diluted blood having the highest sensitivity (79%–96%), NPV (66%–93%), and the lowest OMR (3%–15%). Luminol was also found to be most efficient with a testing time on 25 items of 2 h 50 min compared with up to 8 h. Overall, luminol was the most effective method, also providing information on bloodstain patterns.  相似文献   
72.
This study focuses on the trust that potential jurors have in unsubstantiated evidence and the implications of such trust for legal decision-making. We examined whether participants’ motivation to think deeply (‘need for cognition,’ NC) and belief in science moderated their trust in potentially fallible detection dog evidence when selecting a verdict in a trial scenario. A detection dog twice indicated the presence of drugs in the scenario, yet no drugs were actually found. Those who chose a guilty verdict without drugs present featured stronger beliefs in detection dog evidence. They were also more confident that a dog alert indicated the presence of drugs, even though the scientific literature actually shows that detection dog evidence is subject to biases and other challenges to reliability. Our findings indicate that an unsubstantiated belief and trust in detection dog evidence may negatively influence juror decision-making, which may, in turn, pose consequences for fairness and justice. Participants believed that detection dogs provide powerful and reliable evidence, and these beliefs were clearly associated with stronger beliefs in science. These findings, therefore, raise serious concerns about jurors’ indiscriminate trust in forensic evidence, be it detection dog evidence or other lines of evidence presented in court.  相似文献   
73.
Detection of latent fingermarks on various substrates is critical in crime investigations. Conventional chemical methods using reagents could contaminate or even destruct biological information of samples. Here, an optical method and successful case application of detecting latent fingermarks through long‐wave ultraviolet (UV) fluorescence (300–400 nm) by shortwave UV laser excitation is reported. Experimental results indicate that the recovery rate of the latent fingermarks on various paper items is in the range of 70–80% without chemical treatments. Moreover, the optical method allows for the preservation of samples for further examination, such as polymerase chain reaction (PCR) testing. The technique has also been successfully applied to a criminal case in identifying the suspect, which, to the best of our knowledge, has never been reported in real crime investigations. Therefore, such a method as UV‐excited UV fluorescence in detecting latent fingermarks may be better for examination in cases where biological information of samples is needed for consequent testing.  相似文献   
74.
Detection of canines are well‐known to be valuable in the location of contraband, such as explosives or narcotics. More recently, canines have been trained and utilized in the detection of concealed mass storage devices that might contain evidence of illegal activity such as child pornography. To lay the analytical foundation for this detection work, research was carried out to determine the volatile organic compounds associated with mass storage devices (MSD) that could be used by trained canines for detection. Headspace analysis of a variety of electronic devices was performed using solid phase microextraction (SPME) with gas chromatography/mass spectrometry (GC/MS). Analyses found several volatile compounds common to SIM and SD cards, as well as USB drives, including 2‐propenenitrile, styrene, isophorone, hydroxycyclohexyl phenyl ketone, and 2‐furanmethanol, tetrahydro. Results indicated that mass storage devices do have a characteristic odor profile making detection with minimal false alerts feasible for trained canines.  相似文献   
75.
Inspired by recent research showing that liars are reluctant to include verifiable details in their accounts, we explored in two studies (N?=?125; N?=?105) whether participants who report fabricated symptoms (‘malingerers’) present fewer verifiable details than participants who report genuine ill-health symptoms. In Study 1, participants were instructed to describe a typical day on which they had experienced a genuine or malingered symptom. Truth tellers’ statements included significantly higher proportions of verifiable details concerning the reported symptoms than malingerers’ statements. Compared with truth tellers, malingerers generated longer statements with more unverifiable details. In Study 2, we informed participants that their statements may be assessed for verifiable or checkable details. Malingerers often mentioned ‘false’ witnesses to provide checkable information and differences between malingerers and truth tellers in statement length, and checkable and uncheckable details were no longer significant. The utility and implications of the Verifiability Approach to detection of malingering are discussed.  相似文献   
76.
Attacks on operating system access control have become a significant and increasingly common problem. This type of security threat is recorded in a forensic artifact such as an authentication log. Forensic investigators will generally examine the log to analyze such incidents. An anomaly is highly correlated to an attacker's attempts to compromise the system. In this paper, we propose a novel method to automatically detect an anomaly in the access control log of an operating system. The logs will be first preprocessed and then clustered using an improved MajorClust algorithm to get a better cluster. This technique provides parameter-free clustering so that it automatically can produce an analysis report for the forensic investigators. The clustering results will be checked for anomalies based on a score that considers some factors such as the total members in a cluster, the frequency of the events in the log file, and the inter-arrival time of a specific activity. We also provide a graph-based visualization of logs to assist the investigators with easy analysis. Experimental results compiled on an open dataset of a Linux authentication log show that the proposed method achieved the accuracy of 83.14% in the authentication log dataset.  相似文献   
77.
Memory analysis has been successfully utilized to detect malware in many high profile cases. The use of signature scanning to detect malicious tools is becoming an effective triaging and first response technique. In particular, the Yara library and scanner has emerged as the defacto standard in malware signature scanning for files, and there are many open source repositories of yara rules. Previous attempts to incorporate yara scanning in memory analysis yielded mixed results. This paper examines the differences between applying Yara signatures on files and in memory and how yara signatures can be developed to effectively search for malware in memory. For the first time we document a technique to identify the process owner of a physical page using the Windows PFN database. We use this to develop a context aware Yara scanning engine which can scan all processes simultaneously using a single pass over the physical image.  相似文献   
78.
职务犯罪侦查权的优化配置与运行,不仅关系到检察机关法律监督职能的强化和检察工作的深入发展,而且涉及到国家权力配置模式和运行方式的完善.在深化司法体制改革,推进刑事诉讼法修改,贯彻全国人大常委会<关于批准〈联合国反腐败公约〉的决定>的时代背景下,进一步加强对职务犯罪侦查权配置与运行问题的专题研究,具有重要的现实意义.特别是要对职务犯罪侦查权从法理上作出进一步的阐释,正确认识国家立法机关将这一权力赋予检察机关的法理基础,准确把握职务犯罪侦查权的性质,科学确立职务犯罪侦查权配置和运行的原则.  相似文献   
79.
羊口疮病毒环介导等温扩增快速检测方法的建立及应用   总被引:2,自引:0,他引:2  
参照GenBank中登录的羊口疮病毒(ORFV)序列(Gu320351),针对OrfV的B2L基因保守区域设计了4条引物,通过优化反应条件,建立了检测OrfV的环介导等温扩增技术(LAMP),并进行了特异性试验、敏感性试验及临床样本检测。结果显示,用建立的LAMP方法对OrfV阳性样品扩增产物的电泳呈特征性梯状条带,而绵羊痘病毒、蓝舌病病毒、口蹄疫病毒、丝状支原体山羊亚种、山羊痘病毒及健康山羊皮肤的扩增产物电泳后均无扩增条带。建立的LAMP方法对OrfV的最低检出量为5.3fg,比常规PCR方法高1 000倍。表明建立的LAMP方法特异性强,敏感性高。对6份临床样本的检测结果显示,OrfV阳性检出率为83.33%(5/6),与常规PCR的符合率为100%。本试验为羊口疮病例的临床诊断和OrfV的快速检测提供了新的方法。  相似文献   
80.
Increased use of water search dogs for detecting submerged bodies has created the need for a better understanding of scent emanating from the bodies and how it transits the water to the dog's nose. A review of recent literature identifies likely scent sources, potential scent transport processes, and research needs. Scent sources include gases in bubbles or dissolved in the water, liquids as buoyant plumes and droplets or dissolved in the water, and solids consisting of buoyant particulates with secretions, bacteria, and body fluids. Potential transport processes through the water include buoyancy, entrainment, and turbulence. Transport processes from the water surface into the air include volatilization and evaporation enhanced by bubble bursting, breaking waves, splashing, and wind spray. Implications for the use of water search dogs are examined. Observations of submerged, decomposing bodies are needed to quantify the physical and chemical characteristics of the scent and scent transport processes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号