首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   162篇
  免费   9篇
各国政治   3篇
工人农民   1篇
世界政治   2篇
外交国际关系   3篇
法律   88篇
中国共产党   1篇
中国政治   28篇
政治理论   11篇
综合类   34篇
  2023年   2篇
  2022年   1篇
  2021年   3篇
  2020年   5篇
  2019年   3篇
  2018年   4篇
  2017年   4篇
  2016年   14篇
  2015年   5篇
  2014年   10篇
  2013年   21篇
  2012年   8篇
  2011年   10篇
  2010年   4篇
  2009年   10篇
  2008年   8篇
  2007年   13篇
  2006年   7篇
  2005年   9篇
  2004年   8篇
  2003年   5篇
  2002年   4篇
  2001年   9篇
  2000年   2篇
  1994年   1篇
  1993年   1篇
排序方式: 共有171条查询结果,搜索用时 0 毫秒
21.
近年来,伪劣产品在我国泛滥,妨害正常的市场秩序,危害消费者的身心健康,也损害了我国在国际市场上的声誉。为此,我国加大了打击制售伪劣产品犯罪行为的力度,在全国多次深入开展严厉打击制售假冒伪劣产品的专项斗争。文章介绍了生产、销售伪劣产品罪的认定及侦查方法。  相似文献   
22.
袁燕谊 《政法学刊》2004,21(6):69-70
摄像构图是使主题思想和创作意图形象化,可视化的过程,是依靠一系列造型手段,并通过摄像机的取景框以构成画面造型上的表现形式。熟练掌握摄影构图是提高刑事录像水平的关键,因此,我们有必要来探讨一下摄像构图的特点、动态构图的表现形式以及刑事录像构图的操作技巧。  相似文献   
23.
现场勘验人员的安全防护理应是现场勘查技术中现场保护的主要研究内容。长期以来,对现场保护的研究只是片面强调了对现场的保护,对现场上痕迹、物品及尸体的保护,而对现场勘验人员的安全防护却仅依靠其自身的生活与工作经验,或只是师徒传承等基础之上的自发、盲目的行为。目前,在现场勘验过程中的人员伤亡事故频频发生,教训屡见不鲜,使得现场勘验人员的安全防护成为现场保护薄弱、滞后的研究领域。现场勘验工作本身就是一个需要全体参与人员相互协作配合的团队工作,现场勘验人员的安全防护自然也概莫能外。  相似文献   
24.
货币犯罪的法益既包括国家的货币发行权,又包括货币的公共信用;货币犯罪中原则上,伪造既包括伪造也包括变造,伪造既包括有形伪造,也包括无形伪造;变造既包括有形变造,也包括无形变造;刑法总则第十四条关于犯罪故意的规定决定了货币犯罪行为人对“货币”的性质均应当明知;持有假币罪过重的法定刑设置违背了持有型犯罪的法理。  相似文献   
25.
In this paper, a new nonmetric method called POSAC is presented and illustrated through an analysis of the crime patterns of all the states in the United States. POSAC is a graphical technique for the display of multivariate data in a two-dimensional space. It maps the rows (e.g., states) of a matrix in a way that maximizes the preservation of theirpartial order, with similar states located in close proximity on the map. POSAC is based on the partial order among observations rather than their actual magnitude. POSAC seems to bear the same relationship to the principal-component analysis (PCA) as that borne by the median to the arithmetic mean. As a matter of fact, POSAC is a form of ordinal factor analysis. Its advantage over PCA is its robustness to the data. The technique enables observations and variables to be studied simultaneously. Seven index crime categories are analyzed. In order to demonstrate the utility of POSAC in detecting changes in crime patterns over time, we included in our analysis three selected years: 1944, 1965, and 1987. The results for the year 1987 are compared to those obtained by PCA.  相似文献   
26.
Vertebral artery removing constitutes a significant forensic pathology challenge. Dissection techniques during head-neck autopsy are based on anterior approach, a difficult method, which is unable to assess the transverse part of the artery. This work presents an original and simple method for dissecting vertebral arteries by a posterior approach, opening the vertebroarterial canal through the spinal canal without any special equipment. Once the spinal cord is removed, the transversarium foramens are opened by an internal cut at the pedicle and an external cut at the transverse process. This enables us to visualize vertebral arteries in its entirety. The method improves both the examination of the upper extracranial segment of the vertebral artery and the neuropathological study when arterial injury is suspected. Applying this method routinely is both feasible and useful in suspected cases of vertebral artery trauma and could contribute to assess more precisely the actual incidence of this injury.  相似文献   
27.
Restoration of autopsy incisions can result in inadvertent needle stick injury to the prosector, which can be difficult to prevent even with the use of personal protective equipment such as Kevlar cut resistant gloves. We present a new technique for closure of autopsy incisions using a commonly available commercial hardware tool, a hole punch with a lever enhanced action, combined with blunt probe sewing, which results in an esthetic and leak‐proof means of restoring cadavers. This technique is especially useful in cases which may pose blood‐borne infection risks to the prosector.  相似文献   
28.
《Digital Investigation》2014,11(2):120-140
In this paper, we present a passive approach for effective detection and localization of region-level forgery from video sequences possibly with camera motion. As most digital image/video capture devices do not have modules for embedding watermark or signature, passive forgery detection which aims to detect the traces of tampering without embedded information has become the major focus of recent research. However, most of current passive approaches either work only for frame-level detection and cannot localize region-level forgery, or suffer from high false detection rates for localization of tampered regions. In this paper, we investigate two common region-level inpainting methods for object removal, temporal copy-and-paste and exemplar-based texture synthesis, and propose a new approach based on spatio-temporal coherence analysis for detection and localization of tampered regions. Our approach can handle camera motion and multiple object removal. Experiments show that our approach outperforms previous approaches, and can effectively detect and localize regions tampered by temporal copy-and-paste and texture synthesis.  相似文献   
29.
Digital video is used in criminal trials as evidence with legal responsibility because video content vividly depicts events occurring at a crime scene. However, using sophisticated video editing software, assailants can easily manipulate visible clues for their own benefit. Therefore, the integrity of digital video files acquired or submitted as evidence must be ensured. Forensic analysis of digital video is key to ensuring the integrity of links with individual cameras. In this study, we analyzed whether it is possible to ensure the integrity of MTS video files. Herein, we propose a method to verify the integrity of MTS files encoded by advanced video coding high definition (AVCHD), which is frequently used for video recording. To verify MTS file integrity, we propose five features. Codec information, picture timing, and camera manufacture/model are modified AVI and MP4-like format video verification features. Group of pictures and Universally Unique Identifier patterns were specifically developed for MTS streams. We analyzed the features of 44 standard files recorded using all recording options of seven cameras. We checked whether integrity can be validated on unmanipulated videos recorded in various environments. In addition, we considered whether manipulated MTS files edited in video editing software could be validated. Experimental results show that all unmanipulated and manipulated MTS files with known recording devices were discriminated only when all five features were checked. These results show that the proposed method verifies the integrity of MTS files, strengthening the validity of MTS file-based evidence in trials.  相似文献   
30.
Due to present of enormous free image and video editing software on the Internet, tampering of digital images and videos have become very easy. Validating the integrity of images or videos and detecting any attempt of forgery without use of active forensic technique such as Digital Signature or Digital Watermark is a big challenge to researchers. Passive forensic techniques, unlike active techniques, do not need any preembeded information about the image or video. The proposed paper presents a comprehensive review of the recent developments in the field of digital image and video forensic using noise features. The previously existing methods of image and video forensics proved the importance of noises and encourage us for the study and perform extensive research in this field. Moreover, in this paper, forensic task cover mainly source identification and forgery detection in the image and video using noise features. Thus, various source identification and forgery detection methods using noise features are reviewed and compared in this paper for image and video. The overall objective of this paper is to give researchers a broad perspective on various aspects of image and video forensics using noise features. Conclusion part of this paper discusses about the importance of noise features and the challenges encountered by different image and video forensic method using noise features.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号