首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1038篇
  免费   69篇
各国政治   18篇
工人农民   45篇
世界政治   19篇
外交国际关系   53篇
法律   414篇
中国共产党   28篇
中国政治   154篇
政治理论   96篇
综合类   280篇
  2024年   3篇
  2023年   21篇
  2022年   39篇
  2021年   28篇
  2020年   41篇
  2019年   32篇
  2018年   28篇
  2017年   41篇
  2016年   32篇
  2015年   28篇
  2014年   61篇
  2013年   83篇
  2012年   74篇
  2011年   55篇
  2010年   50篇
  2009年   47篇
  2008年   52篇
  2007年   65篇
  2006年   68篇
  2005年   59篇
  2004年   49篇
  2003年   40篇
  2002年   51篇
  2001年   27篇
  2000年   12篇
  1999年   4篇
  1998年   3篇
  1997年   1篇
  1996年   4篇
  1995年   1篇
  1994年   1篇
  1993年   2篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
  1983年   2篇
排序方式: 共有1107条查询结果,搜索用时 0 毫秒
871.
买卖人体器官是近年来人民群众反响强烈的严重刑事犯罪行为。为加大刑事打击力度,我国《刑法修正案(八)》新增了组织出卖人体器官罪。与其他组织型团伙犯罪不同,此类犯罪有其独有特点,给公安机关认定和侦查带来一定难度,必须选好切入点和突破口,并将侦查和取证结合起来,提高快侦快破和严打效率,切实维护人民群众生命健康安全。  相似文献   
872.
Abstract

Connectivity infrastructure is constantly expanding, increasing internet access across countries, regions and socio-political contexts. Given the fast-changing geography of the internet, there is a growing demand to strengthen cyber capacity beyond national frameworks, in order to develop a transnationally coherent and coordinated governance approach to cybersecurity. In this context, cyber capacity building initiatives are increasingly central in international debates, with the ambition to support countries in the Global South in fostering their cybersecurity strategy from technical and policy perspectives. This article discusses the key factors explaining states’ efforts to enhance their cyber capacity. Based on a cross-national quantitative research approach, the findings contradict international relations (IR)-derived approaches to cybersecurity, which assume that countries develop their cyber capacity according to external security threats, domestic politics or norms. In line with existing research on the role that science plays in policymaking processes more broadly, our results suggest instead that a country’s science and technical knowledge is the most robust explanation for that state’s cyber capacity level. These findings emphasise the need for policymakers to support countries in the Global South in developing their cyber capacity beyond national security paradigms by strengthening education and technical skills in contexts lacking in this resource.  相似文献   
873.
The determination of line crossing sequences between rollerball pens and laser printers presents difficulties that may not be overcome using traditional techniques. This research aimed to study the potential of digital microscopy and 3-D laser profilometry to determine line crossing sequences between a toner and an aqueous ink line. Different paper types, rollerball pens, and writing pressure were tested. Correct opinions of the sequence were given for all case scenarios, using both techniques. When the toner was printed before the ink, a light reflection was observed in all crossing specimens, while this was never observed in the other sequence types. The 3-D laser profilometry, more time-consuming, presented the main advantage of providing quantitative results. The findings confirm the potential of the 3-D laser profilometry and demonstrate the efficiency of digital microscopy as a new technique for determining the sequence of line crossings involving rollerball pen ink and toner.  相似文献   
874.
依据群体性骚乱事件的实战经验和有关理论研究,群体性骚乱事件中警察强行驱散阵法应遵循两大原则:行宜紧密、列宜疏散;兵力宜密,装备宜齐。根据骚乱的性质、人数、环境、天气、地点等实际情况,提出了警察强行驱散的八大阵法,为充分发挥警察的最大战斗力,科学合理有效的处理群体性骚乱事件奠定坚实的基础。  相似文献   
875.
Android智能手机的取证   总被引:3,自引:0,他引:3  
作为一种新兴的智能手机,Android手机发展势头极为迅猛,并越来越多的受到人们的关注。通过对Android智能手机的取证研究,在介绍了Android手机的基本工作原理后,详细描述了取证方式。通过Android SDK工具对手机内外置存储进行镜像备份,逻辑分析利用文件系统分析,查找每个应用程序自带的数据库文件来获得有价值信息,物理分析通过对内存镜像进行数据恢复以寻找删除的文件,两者互相结合。结果表明,能够从Android手机中有效寻找到潜在证据。  相似文献   
876.
When determining an age estimate from adult skeletal remains, forensic anthropologists face a series of methodological choices. These decisions, such as which skeletal region to evaluate, which methods to apply, what statistical information to use, and how to combine information from multiple methods, ultimately impacts the final reported age estimate. In this study, a questionnaire was administered to 145 forensic anthropologists, documenting current trends in adult age at death estimation procedures used throughout the field. Results indicate that the Suchey-Brooks pubic symphysis method (1990) remains the most highly favored aging technique, with cranial sutures and dental wear being the least preferred, regardless of experience. The majority of respondents stated that they vary their skeletal age estimate process case-by-case and ultimately present to officials both a narrow and broad possible age range. Overall, respondents displayed a very high degree of variation in how they generate their age estimates, and indicated that experience and expertise play a large role in skeletal age estimates.  相似文献   
877.
《Justice Quarterly》2012,29(2):344-367
Although researchers have examined the attributes that make offenders more or less responsive to sanction threats, far less attention has centered on the manner in which responsiveness can lead to less detectible crime, or perhaps even more overall crime. Restrictive deterrence is the concept that explains this paradox. We explore it here using qualitative interviews with 35 active auto thieves. Findings suggest that auto thieves' restrictively deterrent decision-making strategies fell into three broad categories: discretionary target selection, normalcy illusions, and defiance. Discussion focuses on the data's conceptual implications for restrictive deterrence and offender decision-making.  相似文献   
878.
Amphetamine samples were analysed by gas chromatography-mass spectrometry (GC-MS), and the peak areas of 33 target compounds were transformed by applying various pretreatment techniques. The objective was to optimise the ability of a number of distance metrics to establish links between samples of amphetamine originating from the same batch (henceforth referred to as linked distances). Furthermore, partial least squares discriminant analysis (PLS-DA) was used to evaluate the effects of various pretreatment methods on separation of amphetamine batches synthesised by the Leuckart reaction, reductive amination of benzyl methyl ketone, and the nitrostyrene route. The most efficient way to pretreat GC-MS data varied for the different distance metrics, although best results were obtained when data were normalised to the sum of peak areas, and either the fourth root or a logarithm was applied to the normalised data. When pretreating normalised data by fourth root transformation, Pearson correlation was the distance metric that was most successful at finding linked samples. Normalisation and the use of fourth root also represented the best method of pretreating data when employing PLS-DA to separate samples synthesised by different routes. To achieve a faster and more user-friendly procedure for evaluating chromatograms, experiments were performed in which the number of target compounds used to compare samples was reduced. The effect of each compound that was removed was studied by applying PLS-DA and by using Pearson correlation to calculate linked distances as well as unlinked distances (between samples from different batches of amphetamine). Considering both links between samples from the same batch and separation of samples synthesised by different routes, the best results were obtained with the data set comprising 26 compounds. Finally, it was found that the profiling method developed in this work was superior to an existing technique with respect to separating linked and unlinked distances.  相似文献   
879.
Ning G  Qu HB  Liu GJ  Wu KM  Xie SX  Chen XJ 《法医学杂志》2007,23(2):97-100
目的比较TW2法英国人标准、TW2法中国人南方标准和TW3法测定腕骨骨龄对特发性性早熟(IPP)女孩的诊断价值。方法女性IPP患儿55例;对照组83例。回顾性分析初诊左腕X线片,用TW2法、TW2CHC中国人南方标准和TW3法盲法分期,分别测得其腕骨骨龄及其百分位,并分为5个连续性的工作点,即:>P97、>P90、>P75、>P50和、≤P50。结果敏感度(Sen)和特异度(Spe)都比较高的有以下3个工作点:TW2CH“>P90”点,TW3“>P90”点,TW2“>P90”点。结论TW系统3种腕骨骨龄对于IPP女孩都有诊断价值,TW3法和TW2法中国人南方标准诊断价值比较高,TW2法英国人标准的诊断价值为中等。  相似文献   
880.
The concept of self-tracking has recently begun to emerge in discussions of ways in which people can record specific features of their lives, often using digital technologies, to monitor, evaluate and optimize themselves. There is evidence that the personal data that are generated by the digital surveillance of individuals (dataveillance) are now used by a range of actors and agencies in diverse contexts. This paper examines the ‘function creep’ of self-tracking by outlining five modes that have emerged: private, communal, pushed, imposed and exploited. The analysis draws upon theoretical perspectives on concepts of selfhood, citizenship, dataveillance and the global digital data economy in discussing the wider socio-cultural implications of the emergence and development of these modes of self-tracking.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号