首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   223篇
  免费   12篇
各国政治   2篇
工人农民   1篇
外交国际关系   7篇
法律   86篇
中国共产党   8篇
中国政治   38篇
政治理论   12篇
综合类   81篇
  2023年   2篇
  2022年   4篇
  2021年   7篇
  2020年   6篇
  2019年   9篇
  2018年   3篇
  2017年   3篇
  2016年   4篇
  2015年   6篇
  2014年   18篇
  2013年   25篇
  2012年   12篇
  2011年   15篇
  2010年   13篇
  2009年   16篇
  2008年   20篇
  2007年   12篇
  2006年   12篇
  2005年   16篇
  2004年   11篇
  2003年   8篇
  2002年   7篇
  2001年   4篇
  2000年   1篇
  1999年   1篇
排序方式: 共有235条查询结果,搜索用时 15 毫秒
71.
虚拟社会(区)研究是信息时代背景下不可回避的一个课题。社区的区域性特征趋于消弭,“共同体”才是社区研究的依托点。虚拟社区是社区发展的新阶段,虚拟社区的管理是现代社区建设的关键。传统的社区警务模式已经遇到了自身难以逾越的障碍,虚拟社区警务则是社区警务的一种颠覆抑或补足。虚拟社区警务的实践在我国虽已悄然实施,但实质土依然处在零谋划、零组织、零警力的阶段,亟需在理论和实践方面予以创新性突破。  相似文献   
72.
戏曲艺术的虚拟动作,在舞台形象的塑造上起着十分重要的作用。虚拟手法的广泛使用,使得戏曲舞台呈现出一种特殊的演出风貌,它的作用已经超出这种手法本身,实际上是为戏曲艺术开辟了一条表现生活的独特途径——以虚拟手法创造的舞台艺术真实,反映了生活的真实。  相似文献   
73.
作为计算机犯罪侦查中重要的证据与线索来源,CMD命令执行记录在揭示犯罪分子行为细节方面发挥着重要作用。本文在详细分析CMD命令执行记录于内存中的数据存储结构基础上,着重说明基于Win-dows操作系统内存转储文件的历史记录重建方法,并对过程中涉及到的具体技术与注意事项予以阐述。  相似文献   
74.
目的建立武汉市中心城区水域春季的硅藻形态及相对构成比数据库。方法2012年3、4月期间,在武汉市中心城区的主要河流、湖泊、公园水域中共选取32个采水点并进行水样采集,利用数字虚拟切片工作站(OLYMPUS-DotSlide)采集图像,对硅藻进行种属鉴别和计数。结果共检见14种硅藻藻属,各水域所含硅藻种类及相对构成比有所差异。结论本研究结果提高了硅藻的阳性检出率、计数的准确率以及溺死诊断的效率,可为溺死案件中相应水域的硅藻比对提供基础检测平台,为溺死地点的推断提供依据。  相似文献   
75.
Abstract

This paper analyses how major institutions are publicly responding to the crime of identity theft. It concentrates on how individuals are encouraged to responsibilize themselves against this potentiality, and what they should do in the event they are victimized. These two distinct discourses (prevention and victimization) aim to fashion a hyper-vigilant citizen whose daily routines, home environment, consumption patterns and sense of self are being brought into accord with wider power dynamics. These measures can be understood as encouraging a care of the virtual self – a wider social project characteristic of an informational age that encourages individuals to reduce the risks and maximize the potentialities related to their data double. In the context of identity theft, however, institutionally promoted methods for the care for the virtual self transcend what is reasonably practicable for most citizens and mask the role played by major institutions in fostering the preconditions for identity theft.  相似文献   
76.
The unprecedented reliance on non-monetary exchange (NME) in transactions among industrial enterprises is one of the most remarkable features of Russia's post-Soviet economic transformation. This paper argues that firms engage in NME in order to discount nominal prices which remain well above market-clearing levels. The mechanisms which prevent a convergence between formal and actual transaction values include asset valuation rules, depreciation schedules, tax regulations and an inadequate bankruptcy mechanism. These distortions to the price-formation mechanism effectively operate to sustain a subsidy regime which has hitherto shielded much of Russian industry from the rigours of the market. The analysis concludes with an examination of the 1998 financial collapse, arguing that the crash was rooted in the breakdown of the subsidy system just described, a process which was strikingly similar to the breakdown of the Soviet economic system a decade earlier.  相似文献   
77.
Since the development of the striagraph, various attempts have been made to enhance forensic investigation through the use of measuring and imaging equipment. This study describes the development of a prototype system employing an easy‐to‐use software interface designed to provide forensic examiners with the ability to measure topography of a toolmarked surface and then conduct various comparisons using a statistical algorithm. Acquisition of the data is carried out using a portable 3D optical profilometer, and comparison of the resulting data files is made using software named “MANTIS” (Mark and Tool Inspection Suite). The system has been tested on laboratory‐produced markings that include fully striated marks (e.g., screwdriver markings), quasistriated markings produced by shear‐cut pliers, impression marks left by chisels, rifling marks on bullets, and cut marks produced by knives. Using the system, an examiner has the potential to (i) visually compare two toolmarked surfaces in a manner similar to a comparison microscope and (ii) use the quantitative information embedded within the acquired data to obtain an objective statistical comparison of the data files. This study shows that, based on the results from laboratory samples, the system has great potential for aiding examiners in conducting comparisons of toolmarks.  相似文献   
78.
Abstract: Analysis of footprints can reveal very important clues which can be used as a forensic evidence and help in the estimation of stature and body weight of an individual. In this work, bilateral footprints were obtained from 50 male Egyptian medical students ranging in age between 18 and 25. Nine measurements were taken on each footprint. The result revealed significant bilateral asymmetry (p < 0.001) except foot breadth at ball. The significant and positive highest correlation coefficients with stature were shown by toe‐5 length on right side (R = 0.58) and with body weight by foot breadth at ball on left side (R = ?0.52). Regression equations presented smaller standard errors of estimate (3.52–4.69) in determination of stature than those in estimation of body weight (4.05–5.28). In conclusion, this study has provided equations that help to estimate stature and body weight from footprint measurements among Egyptians.  相似文献   
79.
青少年网络犯罪原因包括虚拟空间中道德和法律观念的异化与失衡,网络立法具有滞后性和不完善性,不规范的网络环境导致青少年社会化不足,网络亚文化诱发青少年网络心理障碍和青少年犯罪心理的形成等方面。预防青少年网络犯罪的措施包括加强对网络的监管力度,处理好网络法律与网络技术监控的关系,加强防控网络犯罪的国际合作等方面。  相似文献   
80.
虚拟机技术在数据恢复实训课程中的应用   总被引:1,自引:0,他引:1  
首先介绍虚拟机技术的原理及特点,然后基于作者对《数据恢复技术》课程实践教学经验的积累,介绍了利用虚拟机模拟硬盘故障及相应故障恢复的过程和方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号