首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   935篇
  免费   43篇
各国政治   19篇
工人农民   40篇
世界政治   9篇
外交国际关系   25篇
法律   457篇
中国共产党   23篇
中国政治   115篇
政治理论   82篇
综合类   208篇
  2024年   3篇
  2023年   16篇
  2022年   25篇
  2021年   33篇
  2020年   23篇
  2019年   31篇
  2018年   36篇
  2017年   26篇
  2016年   30篇
  2015年   40篇
  2014年   72篇
  2013年   70篇
  2012年   53篇
  2011年   56篇
  2010年   32篇
  2009年   59篇
  2008年   49篇
  2007年   60篇
  2006年   68篇
  2005年   51篇
  2004年   32篇
  2003年   28篇
  2002年   26篇
  2001年   21篇
  2000年   17篇
  1999年   8篇
  1998年   1篇
  1997年   4篇
  1996年   3篇
  1993年   2篇
  1991年   1篇
  1989年   1篇
  1988年   1篇
排序方式: 共有978条查询结果,搜索用时 15 毫秒
131.
目的研究实验大鼠餐后死亡不同时间段的胃主细胞Kappa-阿片受体(KOR)的表达变化。探讨其变化、表达规律与死亡时间(PMI)的相关性。方法实验雄性大鼠,随机分为对照组和实验组,进食后断颈处死后于不同时间提取组织检材,对组织进行免疫组织化学染色,采用图像分析软件测定阳性面积、积分光密度、平均光密度、平均灰度等参数,用SPSS统计软件对各参数与死亡时间的关系进行相关性分析。结果死后9d内的胃主细胞上Kappa-阿片受体随着死亡时间(PMI)的延长,其积分光密度和阳性面积与死亡时间(PMI)存在一定的相关回归关系。结论实验大鼠死后胃主细胞上Kappa-阿片受体的变化规律与死亡时间有相关性。  相似文献   
132.
Due to present of enormous free image and video editing software on the Internet, tampering of digital images and videos have become very easy. Validating the integrity of images or videos and detecting any attempt of forgery without use of active forensic technique such as Digital Signature or Digital Watermark is a big challenge to researchers. Passive forensic techniques, unlike active techniques, do not need any preembeded information about the image or video. The proposed paper presents a comprehensive review of the recent developments in the field of digital image and video forensic using noise features. The previously existing methods of image and video forensics proved the importance of noises and encourage us for the study and perform extensive research in this field. Moreover, in this paper, forensic task cover mainly source identification and forgery detection in the image and video using noise features. Thus, various source identification and forgery detection methods using noise features are reviewed and compared in this paper for image and video. The overall objective of this paper is to give researchers a broad perspective on various aspects of image and video forensics using noise features. Conclusion part of this paper discusses about the importance of noise features and the challenges encountered by different image and video forensic method using noise features.  相似文献   
133.
法律传播是特殊的法律活动,作为社会现象古已有之,它与法律同生长同发展。本文运用人类学、考古学、历史学、社会学、文字学、民族学,以及法学的研究成果,综合考察上古以迄三代之社会形态、语言文字和法律形式的发展历程,厘清中国古代法律传播方式的演变脉络,即经历了由“口耳相传”、到“图象显示”、到“形于文字”的三个阶段。  相似文献   
134.
Intimate links exist between political power, law and images. Theology, philosophy and law have always developed elaborate rules about visuality. The iconophilic and iconoclastic traditions complemented one another and combined to construct subjectivity and to reconcile humanity with finitude. In modernity, law replaced religion and philosophy conceptualised legality through the aesthetic category of the sublime. The law understands the importance of the governance of images for the maintenance of the social bond and helps organise a regime of permitted images and forbidden idols which amounts to a complex legal administration of aesthetics and a related aesthetic organisation of law.  相似文献   
135.
对镜面上遗留的指印采用280B-4型比对投影仪,进行消除重影并利用透射复印法进行固定做了探讨,同时拓宽了280B-4型比对投影仪的应用范围.  相似文献   
136.
This paper comprises a set of marketing guidelines using the 2000 presidential election as an example, and analysing the image building of the two candidates, Al Gore and George W. Bush. It is not hard to understand, with hindsight, why Bush was the winner. Copyright © 2001 Henry Stewart Publications  相似文献   
137.
数字时代呼唤与之相适应的城市治理新形态。技术变革的驱动力、治理生态的不确定性、治理问题的复杂性以及治理需求的多样性共同驱动城市治理数字化转型。城市治理数字化转型要及时回应数字时代需求,坚守以人民为中心的核心价值,重视制度变革的基石作用,充分发挥技术创新的驱动力,实现城市治理的科学化、精准化、智慧化与高效能。城市治理数字化转型的实现,需构建全功能集成、全网络融合、全周期管理、全要素连接的数智治理体系,促进城市治理现代化。  相似文献   
138.
Image interpretation is an important aspect in the field of forensic science; however, it is seldom reported how to use these techniques in explosion scene forensic investigations. On 12 August 2015, a series of explosions killed 165 people and injured hundreds more at a container storage station at the Port of Tianjin. In this study, we applied image interpretation methods to determine the seat of the explosion by analyzing low‐quality video clips of the event. The interpretation fits well with recently published standard operating procedures, including the hypothesis, evaluation, inference, and confirmation. Image processing was adopted to enhance the images while the explosion scene was reconstructed with the same images. Some important features were extracted and utilized to distinguish whether the flashes were caused by reflection or a real blast. We reveal the real explosion location, which guides the overall investigation. The results indicate that image interpretation is a powerful tool for forensic investigators to analyze low‐quality images in complicated explosions or fire accidents.  相似文献   
139.
The use of digital technologies, functioning thanks to data processing, has been conquering many sectors of the world economy and it is possible that, in the near future, only a few markets will still be excluded from this industrial revolution. Therefore, even if one chose unreasonably to disregard the many innovations that the digital economy has brought about, its development seems quite inexorable, although it is true that this new stage in human progress raises some concerns. In particular, many worry about the millions of passive and powerless digital consumers who, facing a few huge and influential companies without any education or awareness, could succumb and find themselves poorer, victimized, and manipulated. The paper proposes to react to this state of affairs without further fueling the fear of the digital revolution and without the thought that regulation can be used only as a shield to protect fragile digital consumers. Rather, by taking inspiration from some regulatory actions undertaken by the European Union, the paper bears in mind that regulation can be used as a sword in the hands of consumers to finally assign them a lead role in digital markets. New rules to empower consumers and to make them take autonomous and independent decisions as to the management of their personal data as well as to the merits of digital firms can be envisaged. After all, one of the cultural roots of Western societies is that every individual should be enabled to be faber ipsius fortunae.  相似文献   
140.
New York State's current lack of legislation criminalizing the threat of revenge porn allows repetitive, invasive, and embarrassing attacks on the morality and sexuality of victims. This can have a severe impact on survivors of domestic violence who are prevented from leaving dangerous situations by threats of dissemination. Victims of revenge porn and domestic violence often face isolation, threats of violence, and thoughts of suicide. This Note proposes that threats of revenge porn become family offenses under the New York Family Court Act § 812.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号