首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   162篇
  免费   9篇
各国政治   3篇
工人农民   1篇
世界政治   2篇
外交国际关系   3篇
法律   88篇
中国共产党   1篇
中国政治   28篇
政治理论   11篇
综合类   34篇
  2023年   2篇
  2022年   1篇
  2021年   3篇
  2020年   5篇
  2019年   3篇
  2018年   4篇
  2017年   4篇
  2016年   14篇
  2015年   5篇
  2014年   10篇
  2013年   21篇
  2012年   8篇
  2011年   10篇
  2010年   4篇
  2009年   10篇
  2008年   8篇
  2007年   13篇
  2006年   7篇
  2005年   9篇
  2004年   8篇
  2003年   5篇
  2002年   4篇
  2001年   9篇
  2000年   2篇
  1994年   1篇
  1993年   1篇
排序方式: 共有171条查询结果,搜索用时 15 毫秒
151.
Interrogation techniques are well explored, but in Slovenia it has remained unknown what interrogation techniques are used and what the basic characteristics of suspect interrogations are. The Slovenian interrogation manual proposes some coercive interrogation techniques and neglects their weaknesses. The aim of the current study was to examine Slovenian police officers’ beliefs as to the basic characteristics of their interrogations and whether techniques proposed by the manual are used in practice to begin to provide some insight into what actually happens in such interrogations. A survey instrument was used to obtain self-report data from a sample of criminal investigators. From 86 completed questionnaires it was found that a typical interrogation of a suspect lasts around 90 minutes and is not recorded. Interviewers typically use three interrogation techniques namely (i) conducting interrogations in isolation; (ii) identifying contradictions in the suspect's story; and (iii) confronting the suspect with evidence. Findings suggest that some coercive interrogation techniques are used in practice (e.g. offering moral justifications, alluding to have evidence of guilt, good cop/bad cop routine, and minimization). The study is the first insight into the practices of Slovenian investigators when questioning suspects. Differences among general, white-collar and organized crime investigators are also discussed.  相似文献   
152.
Video content stored in Video Event Data Recorders (VEDRs) are used as important evidence when certain events such as vehicle collisions occur. However, with sophisticated video editing software, assailants can easily manipulate video records to their advantage without leaving visible clues. Therefore, the integrity of video content recorded through VEDRs cannot be guaranteed, and the number of related forensic issues increases. Existing video integrity detection methods use the statistical properties of the pixels within each frame of the video. However, these methods require ample time, because they check frames individually. Moreover, the frame can easily be replaced and forged using the appropriate public software. To solve this problem, we propose an integrity checking mechanism using the structure of ordered fields in a video file, because existing video editing software does not allow users to access or modify field structures. In addition, because our proposed method involves checking the header information of video content only once, much less detection time is required compared with existing methods that examine the entire frames. We store an ordered file structure of video content as a signature in the database using a customized automated tool. The signature appears according to the video editing software. Then, the suspected video content is compared to a set of signatures. If the file structure matches with a signature, we recognize a manipulated video file by its corresponding editing software. We tested five types of video editing software that cover 99% of the video editing software market share. Furthermore, we arranged 305,981 saving options for all five video editing suites. As a result, we obtained 100% detection accuracy using stored signatures, without false positives, in a collection of 305,981 video files. The principle of this method can be applied to other video formats.  相似文献   
153.
历次四级考试成绩分析结果表明,完形填空的得分普遍较低。许多学生反映,完形填空部分是他们在CET一4中感到最棘手的一项。因此,研究完形填空的出题角度及题型特点,指导学生掌握一定的解题技巧及应试策略,对于提高四级考试整体成绩具有重要的现实意义。  相似文献   
154.
蔡四青 《思想战线》2000,26(1):18-21
企业创新技术的竞争,实质上是如何运用法律手段或专有手段,保护企业创新技术不被竞争对手所掌握,使其处于市场竞争的优势地位.为了保证企业技术创新者的权益不受到侵犯,就必须理顺创新技术竞争秩序.理顺创新技术秩序,关键在于企业如何选择保护方式,这样才能真正地保护新技术,使之立于竞争的不败之地.  相似文献   
155.
Abstract

The global spread of technology and the Internet has produced unique threats that previously did not exist, such as computer hacking and the spread of malicious software to compromise computer systems. These acts have considerable economic and social consequences, leading them to be criminalized in most countries. Recent research with U.S. college samples have found that peer behavior and attitudes supportive of offending are correlated with involvement in hacking. Few have considered these relationships in a cross-national context, particularly with respect to the creation of malicious software. This study addresses these limitations through an examination of college students across three regions: the United States, Taiwan, and South Africa (N = 1,065). The findings from this study demonstrate differences in the neutralizations and definitions associated with both hacking and malware use as well as regional influences on offending. The implications of this study for research on the techniques of neutralization are discussed in detail.  相似文献   
156.
推动检察技术工作创新发展   总被引:1,自引:0,他引:1  
“检察技术”是涉及到检察业务的所有部门,并贯穿于办案的所有程序。正确处理检察技术与检察业务的关系,形成检察技术与业务工作相互配合的工作机制,就成为检察技术工作创新发展,进而推进检察业务工作创新发展的关键。  相似文献   
157.
《劳动合同法》是国家管制贯彻于合同关系始终,亦即管制呈现为结构性介入的调整劳资关系的法律。该法调整劳动合同关系的基本技术形态仍是私法性的,但国家管制借助于这些技术,以强制性规范的方式全面渗透到劳动合同关系的主要方面,并集中落实在对劳动力交易对价以及劳动关系解除成本的控制上,其稳定就业和提高劳动力交易价格的劳工政策目的十分明显。同时,国家通过三方协调机制的设置,在劳动关系持续发展过程中充当着启动并引导"当场交易",维系劳资关系动态平衡的实质作用。  相似文献   
158.
Abstract: Continual reports of illicit trafficking incidents involving radioactive materials have prompted authorities to consider the likelihood of forensic evidence being exposed to radiation. In this study, we investigated the ability to recover latent fingermark evidence from a variety of substrates that were exposed to ionizing radiation. Fingermarks deposited on common surfaces, including aluminum, glass, office paper, and plastic, were exposed to doses ranging from 1 to 1000 kGy, in an effort to simulate realistic situations where evidence is exposed to significant doses of radiation from sources used in a criminal act. The fingermarks were processed using routine fingermark detection techniques. With the exception of glass and aluminum substrates, radiolysis had a considerable effect on the quality of the developed fingermarks. The damage to ridge characteristics can, in part, be attributed to chemical interactions between the substrate and the components of the fingermark secretions that react with the detection reagents.  相似文献   
159.
A video can be manipulated using synthetic zooming without using the state-of-the-art video forgeries. Synthetic zooming is performed by upscaling individual frames of a video with varying scale factors followed by cropping them to the original frame size. These manipulated frames resemble genuine natural (optical) camera zoomed frames and hence may be misclassified as a pristine video by video forgery detection algorithms. Even if such a video is classified as forged, forensic investigators may ignore the results, believing it as part of an optical camera zooming activity. Hence, this can be used as an anti-forensic method which eliminates digital evidence. In this paper, we propose a method for differentiating optical camera zooming from synthetic zooming for video tampering detection. The features used for this method are pixel variance correlation and sensor pattern noise. Experimental results on a dataset containing 3200 videos show the effectiveness of the proposed method.  相似文献   
160.
Nowadays, surveillance systems are used to control crimes. Therefore, the authenticity of digital video increases the accuracy of deciding to admit the digital video as legal evidence or not. Inter‐frame duplication forgery is the most common type of video forgery methods. However, many existing methods have been proposed for detecting this type of forgery and these methods require high computational time and impractical. In this study, we propose an efficient inter‐frame duplication detection algorithm based on standard deviation of residual frames. Standard deviation of residual frame is applied to select some frames and ignore others, which represent a static scene. Then, the entropy of discrete cosine transform coefficients is calculated for each selected residual frame to represent its discriminating feature. Duplicated frames are then detected exactly using subsequence feature analysis. The experimental results demonstrated that the proposed method is effective to identify inter‐frame duplication forgery with localization and acceptable running time.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号