首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1409篇
  免费   125篇
各国政治   6篇
工人农民   12篇
世界政治   3篇
外交国际关系   63篇
法律   1026篇
中国共产党   7篇
中国政治   123篇
政治理论   61篇
综合类   233篇
  2024年   6篇
  2023年   19篇
  2022年   37篇
  2021年   25篇
  2020年   50篇
  2019年   43篇
  2018年   37篇
  2017年   49篇
  2016年   40篇
  2015年   46篇
  2014年   88篇
  2013年   101篇
  2012年   94篇
  2011年   109篇
  2010年   102篇
  2009年   114篇
  2008年   100篇
  2007年   114篇
  2006年   71篇
  2005年   42篇
  2004年   48篇
  2003年   49篇
  2002年   41篇
  2001年   33篇
  2000年   16篇
  1999年   5篇
  1998年   10篇
  1997年   2篇
  1996年   5篇
  1995年   2篇
  1994年   7篇
  1993年   2篇
  1992年   3篇
  1991年   5篇
  1990年   4篇
  1989年   4篇
  1988年   1篇
  1987年   2篇
  1986年   2篇
  1985年   1篇
  1984年   3篇
  1983年   2篇
排序方式: 共有1534条查询结果,搜索用时 0 毫秒
171.
Chrome Yellow (PbCrO4·xPbSO4) was a common pigment in U.S. automobile OEM finishes for more than three decades, but in the early 1990s its use was discontinued. One of its main replacements was Bismuth Vanadate (BiVO4·nBi2MoO6, = 0–2), which was commercially introduced in 1985, as this inorganic pigment also produces a very bright hue and has excellent outdoor durability. This paper describes the in situ identification of Bismuth Vanadate in automotive finishes using FT‐IR and dispersive Raman spectroscopy and XRF spectrometry. Some differentiation of commercial formulations of this pigment is possible based on far‐infrared absorptions, Raman data, and elemental analysis. The spectral differences arise from the presence or absence of molybdenum, the use of two crystal polymorphs of BiVO4, and differences in pigment stabilizers. Bismuth Vanadate is usually not used alone, and it is typically found with Isoindoline Yellow, hydrous ferric oxide, rutile, Isoindolinone Yellow 3R, or various combinations of these.  相似文献   
172.
A standard method for positive identification is the use of antemortem and postmortem radiographic comparisons. The purpose of this research is to test the visual accuracy of antemortem and postmortem radiographic comparisons of cranial vault outlines and to evaluate their uniqueness using geometric morphometric methods. A sample of 106 individuals with varying levels of education and forensic case experience participated in a visual accuracy test. Of the 106 individuals, only 42% correctly assigned all of the radiographs, with accuracy rates ranging from 70 to 93% for each radiographic comparison. Vault shape was further examined using elliptic Fourier analysis, and paired t‐tests were computed on the first 10 principal components accounting for 100% of the variance, which found no significant differences. The visual accuracy test and elliptic Fourier analysis shows that vault outlines may not be unique enough for positive identifications when used as a sole indicator.  相似文献   
173.
We are the middle of a global identity crisis. New notions of identity are made possible in the online world where people eagerly share their personal data and leave ‘digital footprints’. Multiple, partial identities emerge distributed across cyberspace divorced from the physical person. The representation of personal characteristics in data sets, together with developing technologies and systems for identity management, in turn change how we are identified. Trustworthy means of electronic identification is now a key issue for business, governments and individuals in the fight against online identity crime. Yet, along with the increasing economic value of digital identity, there are also risks of identity misuse by organisations that mine large data sets for commercial purposes and in some cases by governments. Data proliferation and the non-transparency of processing practices make it impossible for the individual to track and police their use. Potential risks encompass not only threats to our privacy, but also knowledge-engineering that can falsify digital profiles attributed to us with harmful consequences. This panel session will address some of the big challenges around identity in the digital age and what they mean for policy and law (its regulation and protection). Questions for discussion include: What does identity mean today? What types of legal solutions are fit for purpose to protect modern identity interests? What rights, obligations and responsibilities should be associated with our digital identities? Should identity management be regulated and who should be held liable and for what? What should be the role of private and public sectors in identity assurance schemes? What are the global drivers of identity policies? How can due process be ensured where automated technologies affect the rights and concerns of citizens? How can individuals be more empowered to control their identity data and give informed consent to its use? How are biometrics and location-tracking devices used in body surveillance changing the identity landscape?  相似文献   
174.
微滴式数字PCR技术用于生物样品种属鉴定和绝对定量   总被引:4,自引:0,他引:4  
目的 运用微滴式数字PCR技术进行生物样品的种属鉴定和绝对定量.方法 选择人mtDNA两个编码基因ND4和16S rRNA,设计特异性引物与探针,用人来源及常见动物样本验证种属特异性,再用重组质粒和2组共16份人来源生物检材,倍比稀释.使用微滴式数字PCR技术进行种属检验和绝对定量,验证其灵敏度和稳定性.结果 人重组质粒FAM (ND4)可进行人来源样品的检测,其检测结果与各级稀释梯度基本吻合,微滴式数字PCR技术可以检测出反应体系中低至单拷贝的DNA.结论 微滴式数字PCR技术可以进行生物样品的种属鉴定和绝对定量,并具有很高的灵敏度和特异性,可应用于日常法医物证检验.  相似文献   
175.
《侵权责任法》统一了"医疗事故"和"医疗过错"在民事赔偿标准上二元化和医疗诉讼的诉讼案由及法律适用。然而,医疗损害鉴定的模式应如何走向,《侵权责任法》却没有提及。江苏省医学会大胆革新,开展医疗损害鉴定,在新修订的《民事诉讼法》进一步强调鉴定人出庭作证的背景下,江苏省医学会适应新形势组织医疗损害鉴定专家出庭作证,改变了以往医学会鉴定专家不署名、不出庭的历史,提高了鉴定公信力。  相似文献   
176.
道路交通事故痕迹鉴定是道路交通事故技术鉴定中的重要鉴定项目之一,也是道路交通事故技术鉴定其他鉴定项目的基础,除应用手、足、工、枪、特等刑事技术传统痕迹的基础理论和方法外,还需要结合力学、道路工程学、道路安全学、车辆工程学、法医学等多学科知识综合评判的一门鉴定科学门类。道路交通事故痕迹鉴定的步骤主要分为合同评审、痕迹勘验、比对分析、作出评判、形成文书五个方面,在其发展的十几年时间里,出现了许多亟待解决的问题,根据道路交通事故痕迹鉴定实践工作中遇到的常见问题,重点归纳这些问题并提出解决方案。  相似文献   
177.
The accuracy of fingerprint identifications is critically important to the administration of criminal justice. Accuracy is challenging when two prints from different sources have many common features and few dissimilar features. Such print pairs, known as close non‐matches (CNMs), are increasingly likely to arise as ever‐growing databases are searched with greater frequency. In this study, 125 fingerprint agencies completed a mandatory proficiency test that included two pairs of CNMs. The false‐positive error rates on the two CNMs were 15.9% (17 out of 107, 95% C.I.: 9.5%, 24.2%) and 28.1% (27 out of 96, 95% C.I.: 19.4%, 38.2%), respectively. These CNM error rates are (a) inconsistent with the popular notion that fingerprint evidence is nearly infallible, and (b) larger than error rates reported in leading fingerprint studies. We conclude that, when the risk of CNMs is high, the probative value of a reported fingerprint identification may be severely diminished due to an elevated false‐positive error risk. We call for additional CNM research, including a replication and expansion of the present study using a representative selection of CNMs from database searches.  相似文献   
178.
This paper explores a deep-learning approach to evaluate the position of circular delimiters in cartridge case images. These delimiters define two regions of interest (ROI), corresponding to the breech face and the firing pin impressions, and are placed manually or by an image-processing algorithm. This positioning bears a significant impact on the performance of the image-matching algorithms for firearm identification, and an automated evaluation method would be beneficial to any computerized system. Our contribution consists in optimizing and training U-Net segmentation models from digital images of cartridge cases, intending to locate ROIs automatically. For the experiments, we used high-resolution 2D images from 1195 samples of cartridge cases fired by different 9MM firearms. Our results show that the segmentation models, trained on augmented data sets, exhibit a performance of 95.6% IoU (Intersection over Union) and 99.3% DC (Dice Coefficient) with a loss of 0.014 for the breech face images; and a performance of 95.9% IoU and 99.5% DC with a loss of 0.011 for the firing pin images. We observed that the natural shapes of predicted circles reduce the performance of segmentation models compared with perfect circles on ground truth masks suggesting that our method provide a more accurate segmentation of the real ROI shape. In practice, we believe that these results could be useful for firearms identification. In future work, the predictions may be used to evaluate the quality of delimiters on specimens in a database, or they could determine the region of interest on a cartridge case image.  相似文献   
179.
This study examined how the ideological correlates of left-right identification in the Netherlands changed between 1980 and 2008, and whether these changes were driven by cohort replacement. Analyses on repeated cross-sectional data revealed an increasing association with immigration and a decreasing association with redistribution, secularism, and civil liberties. Cohort differences were found for cultural attitudes: Secularism was most important for voters who were adolescent between 1917 and 1960, while civil liberties were most important for the 1960–1980 cohort and immigration was relatively important for the 1980–2008 cohort. Consequently, over-time changes in the importance of cultural issues, but not redistribution, were partly driven by cohort replacement. This indicates that the left-right distinction is partly shaped by circumstances during voters' adolescent years.  相似文献   
180.
This presentation will provide standards upon which any attempts to meet the challenge of identifying speakers by voice should be based. It is organized into a model based on (i) application of a rigorous research program validating the system, (ii) an upgrading of the organization of the SI area, and (iii) exploitation of new technology. The second part of the presentation will describe an illustrative speech/voice approach to SI development. This effort is also based on an extensive corpus of research. It is suggested that application of the cited standards, plus the illustrative model, will permit reasonable progress to be made. Finally, a number of procedural recommendations are made; they should enhance the efficacy of the proposed approach.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号