首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   843篇
  免费   65篇
各国政治   12篇
工人农民   60篇
世界政治   12篇
外交国际关系   39篇
法律   335篇
中国共产党   33篇
中国政治   129篇
政治理论   91篇
综合类   197篇
  2024年   3篇
  2023年   19篇
  2022年   40篇
  2021年   30篇
  2020年   31篇
  2019年   27篇
  2018年   29篇
  2017年   26篇
  2016年   27篇
  2015年   38篇
  2014年   51篇
  2013年   65篇
  2012年   46篇
  2011年   48篇
  2010年   43篇
  2009年   43篇
  2008年   38篇
  2007年   57篇
  2006年   60篇
  2005年   51篇
  2004年   34篇
  2003年   26篇
  2002年   37篇
  2001年   20篇
  2000年   12篇
  1999年   3篇
  1997年   2篇
  1993年   1篇
  1989年   1篇
排序方式: 共有908条查询结果,搜索用时 15 毫秒
71.
爱尔兰诗人叶芝的诗作中承载"舞蹈"意象的舞者多为女性,在与同代诗人笔下的"舞者"形象进行比较之时,考察叶芝对于男女两性的思考并认为其笔下的女性舞者具有独立的主体性。叶芝将"舞蹈"意象安插在爱尔兰本土的神话传说构成的背景之中,在唤醒爱尔兰人欢乐和悲哀的心理残迹之时激活深蕴着民族性的集体无意识,进行民族身份的追寻和认同。  相似文献   
72.
Abstract: The purpose of this study was to outline a method by which an antemortem photograph of a victim can be critically compared with a postmortem photograph in an effort to facilitate the identification process. Ten subjects, between 27 and 55 years old provided historical pictures of themselves exhibiting a broad smile showing anterior teeth to some extent (a grin). These photos were termed “antemortem” for the purpose of the study. A digital camera was used to take a current photo of each subject’s grin. These photos represented the “postmortem” images. A single subject’s “postmortem” photo set was randomly selected to be the “unknown victim.” These combined data of the unknown and the 10 antemortem subjects were digitally stored and, using Adobe Photoshop software, the images were sized and oriented for comparative analysis. The goal was to devise a technique that could facilitate the accurate determination of which “antemortem” subject was the “unknown.” The generation of antemortem digital overlays of the teeth visible in a grin and the comparison of those overlays to the images of the postmortem dentition is the foundation of the technique. The comparisons made using the GrinLine Identification Technique may assist medical examiners and coroners in making identifications or exclusions.  相似文献   
73.
数码影像的特征接合重叠比对是取代传统特征接合重叠法的重要方法之一,其在检验中具有明显的可行性及操作优势。  相似文献   
74.
数码显微照相、数码红外线反射照相、数码荧光照相、数码彩色分光照相、数码影像的处理技术在文书鉴定、痕迹物证鉴定中均可得到有效应用。随着数码照相研究的不断深入,数码照相在司法鉴定中的应用会越来越广泛。  相似文献   
75.
国家检察官学院要建成一流成人院校 ,必须有一流图书馆。基于此 ,图书馆必须是师生学习、教学和科研的基地 ,是全国检察系统的图书情报资料服务中心。  相似文献   
76.
应用委托开发的软件“中国人群区带染色体辅助分析系统”对国人染色体G带相片进行电子计算机分析。结果显示,该软件能有效快速地记录各个体核型,并能对不同个体来源的相同序号的染色体作直观比较.为染色体多态性应用于亲子鉴定创造了良好条件.  相似文献   
77.
李琪  姜俊鹏 《犯罪研究》2021,(1):95-102
从网络到现实,双层社会迅速形成,相关犯罪亦从现实社会迁移至网络社会。如何应对伴生的新型犯罪形态,关键在于能否全面、清晰认知双层社会的链接点——数据。数据犯罪随双层社会固化而持续扩张,立法、司法均提出各自的应对思路,但规制现状并不乐观。以数据犯罪为核心,分析该犯罪形态在立法与司法领域的表征,并结合其技术与社会的双重价值属性,针对受损法益展开分析,最终实现对相关罪名适用的逻辑化探索。  相似文献   
78.
目的尸体角膜随死后时间延长发生的形态学变化是规律性较好的指标,常用来判断死亡时间(postmortem interval,PMI)。本文尝试用机器视觉代替人的肉眼主观判断,收集尸体样本以建立通过人体角膜图像推断PMI的模型。方法收集实际案例建立包含505例人体死后角膜图像的数据库,PMI范围为0.24h(约死后14min)至492h(约死后20.5d),大致分为三类(依次为:0~<6h、6~<20h、20h及以上)或二类(0~<15h、15h及以上);使用由华盛顿大学陈天奇博士提出的Xgboost模型分别进行二分类与三分类分析;使用多种卷积神经网络模型分别进行分类和回归学习,并通过比较最终选择了由微软研究院提出的ResNet模型进行分析。结果Xgboost在三分类时预测准确率依次为71.8%、40.7%、65.7%,二分类时为90%、48.5%。ResNet分类模型中,精准率、召回率在三分类时分别依次为:81%、75%,30%、50%,61%、71%,二分类时为:70%、92%,76%、38%。ResNet回归模型中,比较整个模型的预测结果,0~6h内的预测值与真实值较为接近,均值误差为0.5616,均方误差为0.5873,6h之后开始出现较大误差。结论分类和回归模型都在0~6h之内得到了很好的结果,说明在此时间段内,角膜图像噪声较低,可预测性强。  相似文献   
79.
Data recovery is an important component of digital forensic research. Although recovering data from hard drives or small-scale mobile devices has been well studied, solid-state disks (SSDs) have a very different internal architecture and some additional functions, and it is not clear whether these differences will have an effect on data recovery. Data scrambling is an additional function of an SSD controller which can improve data reliability, but makes data recovery difficult. In this research, the dedicated flash software was first introduced that can acquire the physical image of an SSD without destroying the device hardware. Based on the software, a validation experiment was presented to evaluate the effect of data scrambling on data recovery and the causes of the effect were analyzed. Then two approaches to descrambling the data in the flash chips were proposed and their advantages and disadvantages discussed. After that, a procedure to identify the scrambling seeds that are used to descramble the scrambled data was described. Finally, descrambling software was implemented based on the second descrambling method. The experiment shows that this software can successfully descramble the data from an SSD flash drive regardless of the internal structure of the scrambler in the SSD controller and can generate an unscrambled physical image on which most existing data-recovery techniques can be effective.  相似文献   
80.
To prevent image forgeries, a number of forensic techniques for digital image have been developed that can detect an image's origin, trace its processing history, and can also locate the position of tampering. Especially, the statistical footprint left by JPEG compression operation can be a valuable source of information for the forensic analyst, and some image forensic algorithm have been raised based on the image statistics in the DCT domain. Recently, it has been shown that footprints can be removed by adding a suitable anti‐forensic dithering signal to the image in the DCT domain, this results in invalid for some image forensic algorithms. In this paper, a novel anti‐forensic algorithm is proposed, which is capable of concealing the quantization artifacts that left in the single JPEG compressed image. In the scheme, a chaos‐based dither is added to an image's DCT coefficients to remove such artifacts. Effectiveness of both the scheme and the loss of image quality are evaluated through the experiments. The simulation results show that the proposed anti‐forensic scheme can verify the reliability of the JPEG forensic tools.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号