首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6169篇
  免费   648篇
各国政治   156篇
工人农民   126篇
世界政治   56篇
外交国际关系   171篇
法律   2969篇
中国共产党   254篇
中国政治   584篇
政治理论   734篇
综合类   1767篇
  2024年   7篇
  2023年   21篇
  2022年   57篇
  2021年   97篇
  2020年   128篇
  2019年   220篇
  2018年   211篇
  2017年   165篇
  2016年   219篇
  2015年   196篇
  2014年   355篇
  2013年   587篇
  2012年   502篇
  2011年   452篇
  2010年   397篇
  2009年   388篇
  2008年   374篇
  2007年   406篇
  2006年   442篇
  2005年   398篇
  2004年   353篇
  2003年   290篇
  2002年   244篇
  2001年   167篇
  2000年   84篇
  1999年   21篇
  1998年   7篇
  1997年   3篇
  1995年   1篇
  1994年   1篇
  1992年   1篇
  1991年   1篇
  1990年   2篇
  1987年   1篇
  1984年   5篇
  1983年   1篇
  1982年   6篇
  1981年   4篇
  1980年   2篇
  1978年   1篇
排序方式: 共有6817条查询结果,搜索用时 15 毫秒
981.
982.
The number of older adults involved in the criminal justice system is rising. Little is known about the state of health in older people who are arrested. This study compared characteristics and health care needs of older police custody detainees with their younger counterparts. The health characteristics of 57 police detainees aged over 50 were compared with 543 younger detainees. Older detainees had significantly higher rates of physical illness and risk of alcohol withdrawal. Although there were equivalent rates of mental disorder and drug taking compared with younger detainees, a higher proportion had presentations consistent with cognitive impairment due to possible dementing processes. Over 80% of older detainees were recommended to have a health assessment in police stations based on their presentation. Police detainees over 50 should be considered to have a health assessment as routine procedure. Further investigation should also be conducted into cognitive impairment in this group.  相似文献   
983.
984.
We examined potential predictors of initial court agreement and 1‐year relitigation in a sample of contested paternity cases involving unmarried parents coming to court to establish paternity, child support, and other issues. Cases participated in an RCT of a parent program and of a waiting period between establishment of paternity and court hearing. We controlled for RCT study factors and used baseline assessment data to predict likelihood of reaching full agreement in the initial court hearing and relitigation in the following year. Findings suggest that cases in which parents get along better outside of court are more likely to reach agreement and less likely to return to court. Additionally, particular parent demographics predict lower likelihood of reaching initial agreement (e.g., parents are non‐White, father earns below $10,000 yearly), more relitigation (e.g., parents are non‐White, mother earns above $10,000 yearly, father has children with others), and less relitigation (e.g., father earns above $10,000 yearly). Child demographics and most parent relationship characteristics did not predict outcomes. We discuss findings and offer suggestions for court interventions.  相似文献   
985.
Gatekeeping has been used as a theory and a measure to describe and assess family dynamics within the context of separation and divorce. In this article, we explore adaptive and maladaptive gatekeeping behaviors and attitudes that can affect the other parent's relationship with the child. Implications are presented for connecting adaptive and maladaptive gatekeeping responses to child outcomes of safety, well‐being, and positive parent–child relationships following separation and divorce. We build on the recent attention to gatekeeping as a potential framework within the child custody context.  相似文献   
986.
刘敏 《北方法学》2017,11(2):120-126
在实行法官员额制改革过程中,必须一并考虑法院审判人员的分类管理和优化配置问题。在民事诉讼中,为保障公民的裁判请求权,对于民事纠纷案件的审理,必须配置入额法官;对于非讼案件的审理、诉前或审前的法院调解以及立案登记等程序事项的处理应交由司法实务官进行,从而让法官专注于民事纠纷案件的审判,以更好地落实公民的裁判请求权保障之宪法理念。司法事务官不同于助理审判员,其不能审理所有的民事案件;司法事务官也不同于法官助理,司法事务官不是法官的助手,其可以依法独立行使职权。司法事务官不是宪法意义上的处理民事纠纷的法官,司法事务官不必进入法官员额。  相似文献   
987.
Globe positioning system (GPS) devices are an increasing importance source of evidence, as more of our devices have built-in GPS capabilities. In this paper, we propose a novel framework to efficiently recover National Marine Electronics Association (NMEA) logs and reconstruct GPS trajectories. Unlike existing approaches that require file system metadata, our proposed algorithm is designed based on the file carving technique without relying on system metadata. By understanding the characteristics and intrinsic structure of trajectory data in NMEA logs, we demonstrate how to pinpoint all data blocks belonging to the NMEA logs from the acquired forensic image of GPS device. Then, a discriminator is presented to determine whether two data blocks can be merged. And based on the discriminator, we design a reassembly algorithm to re-order and merge the obtained data blocks into new logs. In this context, deleted trajectories can be reconstructed by analyzing the recovered logs. Empirical experiments demonstrate that our proposed algorithm performs well when the system metadata is available/unavailable, log files are heavily fragmented, one or more parts of the log files are overwritten, and for different file systems of variable cluster sizes.  相似文献   
988.
Attacks on operating system access control have become a significant and increasingly common problem. This type of security threat is recorded in a forensic artifact such as an authentication log. Forensic investigators will generally examine the log to analyze such incidents. An anomaly is highly correlated to an attacker's attempts to compromise the system. In this paper, we propose a novel method to automatically detect an anomaly in the access control log of an operating system. The logs will be first preprocessed and then clustered using an improved MajorClust algorithm to get a better cluster. This technique provides parameter-free clustering so that it automatically can produce an analysis report for the forensic investigators. The clustering results will be checked for anomalies based on a score that considers some factors such as the total members in a cluster, the frequency of the events in the log file, and the inter-arrival time of a specific activity. We also provide a graph-based visualization of logs to assist the investigators with easy analysis. Experimental results compiled on an open dataset of a Linux authentication log show that the proposed method achieved the accuracy of 83.14% in the authentication log dataset.  相似文献   
989.
In this paper we present a methodology for the forensic analysis of the artifacts generated on Android smartphones by Telegram Messenger, the official client for the Telegram instant messaging platform, which provides various forms of secure individual and group communication, by means of which both textual and non-textual messages can be exchanged among users, as well as voice calls.Our methodology is based on the design of a set of experiments suitable to elicit the generation of artifacts and their retention on the device storage, and on the use of virtualized smartphones to ensure the generality of the results and the full repeatability of the experiments, so that our findings can be reproduced and validated by a third-party.In this paper we show that, by using the proposed methodology, we are able (a) to identify all the artifacts generated by Telegram Messenger, (b) to decode and interpret each one of them, and (c) to correlate them in order to infer various types of information that cannot be obtained by considering each one of them in isolation.As a result, in this paper we show how to reconstruct the list of contacts, the chronology and contents of the messages that have been exchanged by users, as well as the contents of files that have been sent or received. Furthermore, we show how to determine significant properties of the various chats, groups, and channels in which the user has been involved (e.g., the identifier of the creator, the date of creation, the date of joining, etc.). Finally, we show how to reconstruct the log of the voice calls made or received by the user.Although in this paper we focus on Telegram Messenger, our methodology can be applied to the forensic analysis of any application running on the Android platform.  相似文献   
990.
WeChat is one of the most popular instant-messaging smartphone applications in the world. At the end of 2015, WeChat had 697 million monthly active users from over 200 countries. Although WeChat was designed originally for communication between relatives and friends, its abundant social functions are now also used by criminals for communication, and even for the organization and coordination of criminal acts. Therefore, communication records of social networking services like WeChat extracted from the smartphones of criminals are always the vital digital evidences for the investigation and prosecution of criminal cases. At present, only a few literatures focused on WeChat forensics. This paper describes several common questions that arise in forensic examinations of Android WeChat and provides corresponding technical methods that are useful to address these questions. This paper is intended to provide vital references for the investigators and researchers working on the digital forensics.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号