首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1211篇
  免费   46篇
各国政治   21篇
工人农民   33篇
世界政治   25篇
外交国际关系   67篇
法律   353篇
中国共产党   48篇
中国政治   205篇
政治理论   142篇
综合类   363篇
  2024年   2篇
  2023年   16篇
  2022年   9篇
  2021年   27篇
  2020年   31篇
  2019年   13篇
  2018年   28篇
  2017年   33篇
  2016年   31篇
  2015年   18篇
  2014年   71篇
  2013年   102篇
  2012年   79篇
  2011年   89篇
  2010年   59篇
  2009年   78篇
  2008年   68篇
  2007年   80篇
  2006年   102篇
  2005年   73篇
  2004年   52篇
  2003年   61篇
  2002年   59篇
  2001年   43篇
  2000年   20篇
  1999年   9篇
  1998年   1篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
排序方式: 共有1257条查询结果,搜索用时 15 毫秒
191.
大学生科技创新能力的模糊综合评价研究   总被引:1,自引:0,他引:1  
为了促进大学生的科技创新能力的可持续发展,立足教学,联系大学生科技创新实践,建立大学生科技创新能力评价指标体系,该指标体系包括6个一级指标和37个二级指标,然后给出大学生科技创新能力的模糊综合评价方法。最后以机电工程系为例,对该系大学生科技创新能力进行综合评价,明确其优势和薄弱环节,实现全面发展。  相似文献   
192.
对新世纪辽宁科技创新政策的评价有利于提高政策的科学性和效力。新世纪辽宁科技创新政策具有出台政策不断增多、紧密配合中央政策以及很好地体现辽宁实际的特点。但是也存在一些问题,主要表现在辽宁风险投资政策缺乏,制约了风险投资活动的发展;产学研政策落实不到位,削弱各产学研主体间合作的动力以及中小企业政策操作性不强,降低服务质量。针对这些问题,提出完善辽宁科技创新政策的对策建议,包括出台并落实辽宁风险投资的有关政策,健全辽宁产学研的配套政策体系,以及加强辽宁中小企业政策和服务体系的细化与深入。  相似文献   
193.
物流仿真软件的应用现状与发展   总被引:1,自引:0,他引:1       下载免费PDF全文
物流仿真在我国已逐渐显出其重要作用。我国物流发展水平和研究应用能力还不尽人意,物流企业或企业物流在面临物流工程项目投资新建或原有系统技术改造时,由于缺乏准确丰富的信息数据和必要的物流仿真系统决策支持,造成了企业物流项目建设投入的盲目性和资金流失。物流仿真借助计算机技术对物流系统进行真实模仿,通过仿真实验得到各种动态活动及过程瞬间仿效记录,进而验证物流工程项目建设的有效性、合理性和优化效果,因此物流仿真是有其重要意义的。本文着重介绍物流仿真的功能,几种常见的物流仿真软件的性能特点,同时结合Flexsim和RaLC(乐龙)两种国内外典型仿真软件,进行物流仿真软件的应用过程与仿真效果分析。  相似文献   
194.
科技是第一生产力,农业科技是农业生产力发展的重要推动因素。与俄罗斯远东地区开展农业科技交流与合作,充分利用、吸收俄罗斯的先进农业科技成果,推动科技成果产业化,有利于黑龙江省加速农业发展和农业科技进步,有利于提高农业科技自主创新能力,有利于增强农业竞争力。提升黑龙江省与俄远东地区的农业科技合作水平,必须建立完善的合作机制,具备充足的资金保障,以农业科技成果产业化为主导,加快复合型人才的培养。  相似文献   
195.
Aimed at reinforcing the democratic values of freedom of speech and increased diversity in civic access to the means of communication, this paper examines the concept of democracy within an information and communication technology-mediated context. Discussion proceeds with an analysis of orthodox views adopted by Jefferson and the architects of the American Constitution. Building on the Jeffersonian tradition, a critique is presented of present-day, non-transparent constraints on the democratic values of freedom of speech, information access and the structural constrains mitigating unfettered public access to critical information and debate on fundamental social and political issues of the day. The proposed ‘custodiary’ model for the new Democratic Project is premised on the development of a constitutional framework which encourages information diversity and freedom of access and expression as a way of bringing back ‘discourse’ into democratic praxis.  相似文献   
196.
Telephone town halls are an increasingly prevalent method for members of Congress (MCs) to communicate with constituents, even while garnering popular criticism for failing to facilitate engagement and accountability. Yet scholars have paid little attention to the events and their effects, and even less to how they might be improved. To remedy this problem, we report on a field experiment in which four MCs joined their constituents in telephone town halls. Overall, participation in an event improved constituents’ evaluations of the format in general, and of the MC in particular. Furthermore, we studied how these events might be improved by evaluating a reform—a single‐topic focus with predistributed briefing materials—designed to enhance deliberative interaction. This reform enhanced effects on opinions of the format without significantly altering effects on attitudes toward the MC. Our results suggest that telephone town halls hold promise for constituents, officeholders, and democratic practice.  相似文献   
197.
198.
199.
EU update     
This is the latest edition of the DLA Piper column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
200.
We employ a rational choice framework to understand the conditions under which sex traffickers allow their victims access to telecommunications devices while under their control. We posit that sex traffickers are rational actors who make calculated decisions regarding whether to allow their victims access to the Internet and cell phones. We hypothesize that sex traffickers allow younger victims and those they did not defraud in the recruitment process greater access to telecommunications devices because these decisions maximize their payoffs with minimal risk. However, we hypothesize that younger victims’ access to telecommunications devices is conditional on whether they have been defrauded in recruitment. In order to test these hypotheses, we deployed a survey to 115 victims of sex trafficking in the United States to learn about how they were recruited by their sex trafficker and the level of access they had to technology while under their sex trafficker's control. We find support for all of our hypotheses. The results have serious implications for criminal justice policy and practice.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号