全文获取类型
收费全文 | 375篇 |
免费 | 22篇 |
专业分类
各国政治 | 28篇 |
工人农民 | 12篇 |
世界政治 | 48篇 |
外交国际关系 | 48篇 |
法律 | 139篇 |
中国共产党 | 2篇 |
中国政治 | 12篇 |
政治理论 | 92篇 |
综合类 | 16篇 |
出版年
2024年 | 1篇 |
2023年 | 6篇 |
2022年 | 1篇 |
2021年 | 10篇 |
2020年 | 14篇 |
2019年 | 18篇 |
2018年 | 22篇 |
2017年 | 28篇 |
2016年 | 14篇 |
2015年 | 20篇 |
2014年 | 16篇 |
2013年 | 106篇 |
2012年 | 24篇 |
2011年 | 15篇 |
2010年 | 13篇 |
2009年 | 20篇 |
2008年 | 9篇 |
2007年 | 10篇 |
2006年 | 15篇 |
2005年 | 11篇 |
2004年 | 5篇 |
2003年 | 5篇 |
2002年 | 7篇 |
2001年 | 2篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1996年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有397条查询结果,搜索用时 15 毫秒
141.
Su-Mei Ooi 《Democratization》2013,20(2):311-334
External state pressure is understood to have played a causally significant role in democratic breakthrough in Taiwan and South Korea during the 1980s. This article problematizes the international dimensions of democratization in Taiwan and South Korea by first providing a revisionist account of external agency which involved complex networks of transnational nonstate and substate actors. These included human rights activists, Christian churches and related ecumenical organizations, members of the Taiwanese and Korean diaspora communities in the US, academics and students, foreign journalists, and members of the US Congress. In forming a transnational “protection regime” during the 1970s and 1980s to protect the political opposition from repressive governments, they contributed to the development of effective democratic movements. The case studies provide us with a more comprehensive view of the international dimensions of democratization, speaking to both the country specific and general theoretical literatures on democratization at the same time. 相似文献
142.
John Stogner Bonnie S. Fisher Eric A. Stewart Christopher J. Schreck 《Women & Criminal Justice》2013,23(1):62-81
Though a large body of research has found that peer social network characteristics influence both offending and victimization, relatively little is known about the influence of social network characteristics on adolescent sexual victimization. Attractiveness and sociability largely indicate popularity for teenage females, which in turn leads to earlier onset of dating, greater dating options, and potential risk of sexual victimization—an observation not tested in the criminological and criminal justice literature. We suggest and evaluate 2 competing hypotheses: that popularity within a network insulates females from sexual victimization and that popularity may increase exposure to delinquent others and facilitate sexual victimization. Results suggest that popularity does not have a consistent effect but instead that its role is conditioned by the deviance of the network. Popularity is associated with an increase in the likelihood of victimization when peer deviance is high but with a decrease when peer deviance is low. We further demonstrate that an interaction between a female's own drinking and the proportion of her friends that are male strongly affects her likelihood of sexual victimization. Implications for policy and future research are explored. 相似文献
143.
This paper examines the structure and modus operandi of South Asian criminal organisations operating in the UK. It is based
on empirical research conducted between 2005 and 2006 among prisoners sentenced for drug offences, a number of drug distributors
operating in the market, and observers with a knowledge of the drugs business working for the police force or for rehabilitation
services. First, the paper offers an overview of the debate on organised crime, and after a methodological note, the research
findings are utilised to propose a typology. Hypotheses are formulated around the illicit drug enterprises involved in British
markets. Finally, the implications for law enforcement with respect to these enterprises are discussed.
相似文献
Vincenzo RuggieroEmail: |
144.
Gerda Edelman M.Sc. Ivo Alberink Ph.D. Bart Hoogeboom M.Sc. 《Journal of forensic sciences》2010,55(2):358-365
Abstract: In the case study, two methods of performing body height measurements in images are compared based on projective geometry and 3D modeling of the crime scene. Accuracy and stability of height estimations are tested using reconstruction images of test persons of known height. Given unchanged camera settings, predictions of both methods are accurate. However, as the camera had been moved in the case, new vanishing points and camera matches had to be created for the reconstruction images. 3D modeling still yielded accurate and stable estimations. Projective geometry produced incorrect predictions for test persons and unstable intervals for questioned persons. The latter is probably caused by the straight lines in the field of view being hard to discern. With the quality of material presented, which is representative for our case practice, using vanishing points may thus yield unstable results. The results underline the importance of performing validation experiments in casework. 相似文献
145.
Denis Trček Ph.D. Habtamu Abie Ph.D. Åsmund Skomedal Ph.D. Iztok Starc B.Sc. 《Journal of forensic sciences》2010,55(6):1471-1480
Abstract: Recent trends in global networks are leading toward service‐oriented architectures and sensor networks. On one hand of the spectrum, this means deployment of services from numerous providers to form new service composites, and on the other hand this means emergence of Internet of things. Both these kinds belong to a plethora of realms and can be deployed in many ways, which will pose serious problems in cases of abuse. Consequently, both trends increase the need for new approaches to digital forensics that would furnish admissible evidence for litigation. Because technology alone is clearly not sufficient, it has to be adequately supported by appropriate investigative procedures, which have yet become a subject of an international consensus. This paper therefore provides appropriate a holistic framework to foster an internationally agreed upon approach in digital forensics along with necessary improvements. It is based on a top‐down approach, starting with legal, continuing with organizational, and ending with technical issues. More precisely, the paper presents a new architectural technological solution that addresses the core forensic principles at its roots. It deploys so‐called leveled message authentication codes and digital signatures to provide data integrity in a way that significantly eases forensic investigations into attacked systems in their operational state. Further, using a top‐down approach a conceptual framework for forensics readiness is given, which provides levels of abstraction and procedural guides embellished with a process model that allow investigators perform routine investigations, without becoming overwhelmed by low‐level details. As low‐level details should not be left out, the framework is further evaluated to include these details to allow organizations to configure their systems for proactive collection and preservation of potential digital evidence in a structured manner. The main reason behind this approach is to stimulate efforts on an internationally agreed “template legislation,” similarly to model law in the area of electronic commerce, which would enable harmonized national implementations in the area of digital forensics. 相似文献
146.
Abstract: Sometimes the question arises whether it is possible to estimate the velocity of a speeding car recorded by closed circuit television cameras. By estimating the travelled distance of the car between two images and the time elapsed, estimation of the velocity is rather straightforward. However, to quantify the corresponding measurement uncertainty, the data analysis becomes more involved. The article describes two approaches as to how to derive the measurement uncertainty. In the first method, distance and timing are estimated separately, and the two uncertainties are combined to derive the measurement uncertainty for the velocity. For this, a frequentist and a Bayesian approach are described. In the second method, the measurement uncertainty for the speed is derived directly using validation recordings of a car driving by at known speed. The choice which method to use depends mainly on the length of the path that the car has travelled. 相似文献
147.
论食品安全国际法律规制中的软法 总被引:1,自引:0,他引:1
食品安全国际法律规制中的软法主要表现为跨政府治理网络中的国际软法和有关国际组织制定的国际软法。前者是指不同国家的食品安全政府职能部门之间以双边备忘录等形式达成的非条约性协议。后者是指专业性国际组织、区域性国际组织和国际非政府组织制定的与食品安全相关的指导建议、行动计划、原则宣言和标准等国际文件。这些没有法律约束力但具有实际效力的国际软法在食品安全国际法律规制中发挥着独特的补充和辅助功能,理应引起我们的关注。 相似文献
148.
149.
Using social network analysis (SNA), we propose a model for targeting criminal networks. The model we present here is a revised
version of our existing model (Schwartz and Rouselle in IALEIA Journal, 18(1):18–14, 2008), which itself builds on Steve Borgatti’s SNA-based key player approach. Whereas Borgatti’s approach focuses solely on actors’
network positions, our model also incorporates the relative strength or potency of actors, as well as the strength of the
relationships binding network actors.
相似文献
Tony (D.A.) Rouselle |
150.
In this paper, we propose two methods to recover damaged audio files using deep neural networks. The presented audio file recovery methods differ from the conventional file carving-based recovery method because the former restore lost data, which are difficult to recover with the latter method. This research suggests that recovery tasks, which are essential yet very difficult or very time consuming, can be automated with the proposed recovery methods using deep neural networks. We apply feed-forward and Long Short Term Memory neural networks for the tasks. The experimental results show that deep neural networks can distinguish speech signals from non-speech signals, and can also identify the encoding methods of the audio files at the level of bits. This leads to successful recovery of the damaged audio files, which are otherwise difficult to recover using the conventional file-carving-based methods. 相似文献