首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   375篇
  免费   22篇
各国政治   28篇
工人农民   12篇
世界政治   48篇
外交国际关系   48篇
法律   139篇
中国共产党   2篇
中国政治   12篇
政治理论   92篇
综合类   16篇
  2024年   1篇
  2023年   6篇
  2022年   1篇
  2021年   10篇
  2020年   14篇
  2019年   18篇
  2018年   22篇
  2017年   28篇
  2016年   14篇
  2015年   20篇
  2014年   16篇
  2013年   106篇
  2012年   24篇
  2011年   15篇
  2010年   13篇
  2009年   20篇
  2008年   9篇
  2007年   10篇
  2006年   15篇
  2005年   11篇
  2004年   5篇
  2003年   5篇
  2002年   7篇
  2001年   2篇
  2000年   2篇
  1999年   1篇
  1996年   1篇
  1990年   1篇
排序方式: 共有397条查询结果,搜索用时 15 毫秒
141.
Su-Mei Ooi 《Democratization》2013,20(2):311-334
External state pressure is understood to have played a causally significant role in democratic breakthrough in Taiwan and South Korea during the 1980s. This article problematizes the international dimensions of democratization in Taiwan and South Korea by first providing a revisionist account of external agency which involved complex networks of transnational nonstate and substate actors. These included human rights activists, Christian churches and related ecumenical organizations, members of the Taiwanese and Korean diaspora communities in the US, academics and students, foreign journalists, and members of the US Congress. In forming a transnational “protection regime” during the 1970s and 1980s to protect the political opposition from repressive governments, they contributed to the development of effective democratic movements. The case studies provide us with a more comprehensive view of the international dimensions of democratization, speaking to both the country specific and general theoretical literatures on democratization at the same time.  相似文献   
142.
Though a large body of research has found that peer social network characteristics influence both offending and victimization, relatively little is known about the influence of social network characteristics on adolescent sexual victimization. Attractiveness and sociability largely indicate popularity for teenage females, which in turn leads to earlier onset of dating, greater dating options, and potential risk of sexual victimization—an observation not tested in the criminological and criminal justice literature. We suggest and evaluate 2 competing hypotheses: that popularity within a network insulates females from sexual victimization and that popularity may increase exposure to delinquent others and facilitate sexual victimization. Results suggest that popularity does not have a consistent effect but instead that its role is conditioned by the deviance of the network. Popularity is associated with an increase in the likelihood of victimization when peer deviance is high but with a decrease when peer deviance is low. We further demonstrate that an interaction between a female's own drinking and the proportion of her friends that are male strongly affects her likelihood of sexual victimization. Implications for policy and future research are explored.  相似文献   
143.
This paper examines the structure and modus operandi of South Asian criminal organisations operating in the UK. It is based on empirical research conducted between 2005 and 2006 among prisoners sentenced for drug offences, a number of drug distributors operating in the market, and observers with a knowledge of the drugs business working for the police force or for rehabilitation services. First, the paper offers an overview of the debate on organised crime, and after a methodological note, the research findings are utilised to propose a typology. Hypotheses are formulated around the illicit drug enterprises involved in British markets. Finally, the implications for law enforcement with respect to these enterprises are discussed.
Vincenzo RuggieroEmail:
  相似文献   
144.
Abstract: In the case study, two methods of performing body height measurements in images are compared based on projective geometry and 3D modeling of the crime scene. Accuracy and stability of height estimations are tested using reconstruction images of test persons of known height. Given unchanged camera settings, predictions of both methods are accurate. However, as the camera had been moved in the case, new vanishing points and camera matches had to be created for the reconstruction images. 3D modeling still yielded accurate and stable estimations. Projective geometry produced incorrect predictions for test persons and unstable intervals for questioned persons. The latter is probably caused by the straight lines in the field of view being hard to discern. With the quality of material presented, which is representative for our case practice, using vanishing points may thus yield unstable results. The results underline the importance of performing validation experiments in casework.  相似文献   
145.
Abstract: Recent trends in global networks are leading toward service‐oriented architectures and sensor networks. On one hand of the spectrum, this means deployment of services from numerous providers to form new service composites, and on the other hand this means emergence of Internet of things. Both these kinds belong to a plethora of realms and can be deployed in many ways, which will pose serious problems in cases of abuse. Consequently, both trends increase the need for new approaches to digital forensics that would furnish admissible evidence for litigation. Because technology alone is clearly not sufficient, it has to be adequately supported by appropriate investigative procedures, which have yet become a subject of an international consensus. This paper therefore provides appropriate a holistic framework to foster an internationally agreed upon approach in digital forensics along with necessary improvements. It is based on a top‐down approach, starting with legal, continuing with organizational, and ending with technical issues. More precisely, the paper presents a new architectural technological solution that addresses the core forensic principles at its roots. It deploys so‐called leveled message authentication codes and digital signatures to provide data integrity in a way that significantly eases forensic investigations into attacked systems in their operational state. Further, using a top‐down approach a conceptual framework for forensics readiness is given, which provides levels of abstraction and procedural guides embellished with a process model that allow investigators perform routine investigations, without becoming overwhelmed by low‐level details. As low‐level details should not be left out, the framework is further evaluated to include these details to allow organizations to configure their systems for proactive collection and preservation of potential digital evidence in a structured manner. The main reason behind this approach is to stimulate efforts on an internationally agreed “template legislation,” similarly to model law in the area of electronic commerce, which would enable harmonized national implementations in the area of digital forensics.  相似文献   
146.
Abstract: Sometimes the question arises whether it is possible to estimate the velocity of a speeding car recorded by closed circuit television cameras. By estimating the travelled distance of the car between two images and the time elapsed, estimation of the velocity is rather straightforward. However, to quantify the corresponding measurement uncertainty, the data analysis becomes more involved. The article describes two approaches as to how to derive the measurement uncertainty. In the first method, distance and timing are estimated separately, and the two uncertainties are combined to derive the measurement uncertainty for the velocity. For this, a frequentist and a Bayesian approach are described. In the second method, the measurement uncertainty for the speed is derived directly using validation recordings of a car driving by at known speed. The choice which method to use depends mainly on the length of the path that the car has travelled.  相似文献   
147.
论食品安全国际法律规制中的软法   总被引:1,自引:0,他引:1  
食品安全国际法律规制中的软法主要表现为跨政府治理网络中的国际软法和有关国际组织制定的国际软法。前者是指不同国家的食品安全政府职能部门之间以双边备忘录等形式达成的非条约性协议。后者是指专业性国际组织、区域性国际组织和国际非政府组织制定的与食品安全相关的指导建议、行动计划、原则宣言和标准等国际文件。这些没有法律约束力但具有实际效力的国际软法在食品安全国际法律规制中发挥着独特的补充和辅助功能,理应引起我们的关注。  相似文献   
148.
149.
Using social network analysis (SNA), we propose a model for targeting criminal networks. The model we present here is a revised version of our existing model (Schwartz and Rouselle in IALEIA Journal, 18(1):18–14, 2008), which itself builds on Steve Borgatti’s SNA-based key player approach. Whereas Borgatti’s approach focuses solely on actors’ network positions, our model also incorporates the relative strength or potency of actors, as well as the strength of the relationships binding network actors.
Tony (D.A.) Rouselle
  相似文献   
150.
In this paper, we propose two methods to recover damaged audio files using deep neural networks. The presented audio file recovery methods differ from the conventional file carving-based recovery method because the former restore lost data, which are difficult to recover with the latter method. This research suggests that recovery tasks, which are essential yet very difficult or very time consuming, can be automated with the proposed recovery methods using deep neural networks. We apply feed-forward and Long Short Term Memory neural networks for the tasks. The experimental results show that deep neural networks can distinguish speech signals from non-speech signals, and can also identify the encoding methods of the audio files at the level of bits. This leads to successful recovery of the damaged audio files, which are otherwise difficult to recover using the conventional file-carving-based methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号