首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   711篇
  免费   42篇
各国政治   8篇
工人农民   37篇
世界政治   8篇
外交国际关系   55篇
法律   202篇
中国共产党   44篇
中国政治   102篇
政治理论   76篇
综合类   221篇
  2024年   3篇
  2023年   14篇
  2022年   34篇
  2021年   19篇
  2020年   26篇
  2019年   19篇
  2018年   19篇
  2017年   16篇
  2016年   13篇
  2015年   16篇
  2014年   28篇
  2013年   43篇
  2012年   38篇
  2011年   40篇
  2010年   54篇
  2009年   37篇
  2008年   31篇
  2007年   42篇
  2006年   47篇
  2005年   46篇
  2004年   51篇
  2003年   33篇
  2002年   40篇
  2001年   23篇
  2000年   9篇
  1999年   3篇
  1998年   7篇
  1994年   1篇
  1993年   1篇
排序方式: 共有753条查询结果,搜索用时 0 毫秒
221.
加强高校图书馆人力资源管理   总被引:1,自引:0,他引:1  
人力资源管理渗透于社会生活的各个领域,高校图书馆在人力资源管理方面存在一些问题,采取的对策包括树立人力资源为第一资源的新理念,科学规划人员知识结构,实现人力资源增值等方面。  相似文献   
222.
利用Exif信息内容鉴定数码照片   总被引:2,自引:1,他引:1  
目的通过对数码照片的Exif信息检查,判断数码照片的真伪。方法通过相关软件工具查看Exif信息中的元数据。结果如果Exif信息中的元数据已被改动,则数码照片已被修改。结论 Exif信息中的元数据可作为判断数码照片真伪的检测要素之一。  相似文献   
223.
著作权法与数字图书馆建设之间存在冲突,但是二者在根本上又是一致的,在作者权利的行使与数字图书馆使用作品的利益维护之间能够找到一个既现实又合理的平衡点。著作权法中规定的法定许可制度和合理使用制度不失为这一平衡点不错的选择。  相似文献   
224.
作为社会主义学院重要的组成部分,图书馆在学院发展中有着重要的地位和作用.为此,本文从社会主义学院的性质和特点入手,结合全国社院图书馆的现状,对社院图书馆的定位与发展方向进行了分析,提出了社院图书馆应该建设成为一个小规模、专业化、现代化的图书馆的观点,并对社院图书馆的现代化建设提出了建议.  相似文献   
225.
采用常规方法构建了青海血蜱幼蜱cDNA表达文库,初级文库的库容量为5.0×105PFU/mL,扩增后的库容量为8×109PFU/mL;用兔抗青海血蜱幼蜱阳性血清对该文库进行了免疫学筛选,对阳性噬菌体进行了亚克隆,提取质粒后转化宿主菌JM109,最终共得到幼蜱基因11个,分别命名为HqL1、HqL2、HqL3、HqL4、HqL5、HqL6、HqL7、HqL8、HqL9、HqL10、HqL11。测序分析表明,其中的6个为新基因。分析发现HqL7、HqL8、HqL9和HqL11具有较高的研究价值。  相似文献   
226.
数字影像是刑事案件的证据之一,为发挥其证据效力,应建立和完善它的主体适格性保障机制、质量技术性保障机制和操作流程规范性保障机制。  相似文献   
227.
Since its inception, over a decade ago, the field of digital forensics has faced numerous challenges. Despite different researchers and digital forensic practitioners having studied and analysed various known digital forensic challenges, as of 2013, there still exists a need for a formal classification of these challenges. This article therefore reviews existing research literature and highlights the various challenges that digital forensics has faced for the last 10 years. In conducting this research study, however, it was difficult for the authors to review all the existing research literature in the digital forensic domain; hence, sampling and randomization techniques were employed to facilitate the review of the gathered literature. Taxonomy of the various challenges is subsequently proposed in this paper based on our review of the literature. The taxonomy classifies the large number of digital forensic challenges into four well‐defined and easily understood categories. The proposed taxonomy can be useful, for example, in future developments of automated digital forensic tools by explicitly describing processes and procedures that focus on addressing specific challenges identified in this paper. However, it should also be noted that the purpose of this paper was not to propose any solutions to the individual challenges that digital forensics face, but to serve as a survey of the state of the art of the research area.  相似文献   
228.
This article looks at the promise of technology to revolutionise humanitarian action, especially in terms of the gathering and use of data. With many heralding a ‘data revolution’, the opportunities and enthusiasm for using social media and SMS data in crisis response are on the rise. The article constructs an analytical framework in order to scrutinise the three main claims made on behalf of technologically advanced humanitarian information systems: that they can access data more accurately, more quickly, and alter power relations in emancipatory ways. It does so in relation to two aspects of digital humanitarianism: visual technology and crisis mapping, and big data. The article is partly informed by a historical perspective, but also by interview and other material that suggests some of the claims made on behalf of technology are exaggerated. In particular, we argue that the enthusiasm for the data is vastly outstripped by the capacity to meaningfully analyse it. We conclude by scoping the implications of the future technological evolution of humanitarianism, in particular by examining how technology contributes to what Duffield terms ‘post-modern humanitarianism’.  相似文献   
229.
Digitally mediated communication technologies have fundamentally changed the problem of child sexual abuse. Sexually explicit images of young people that can be found online range from those documenting offline abuse including adult-to-child and peer-on-peer violence, to self-generated images including those taken within the context of a coercive relationship or those that are shared online beyond the taker's control. Online availability of these images can have serious effects on victims. It is vital to identify what victims need, how youngsters are at risk online, how self-generated images may be shared online beyond the taker's control, and how children who have been traumatized by experiences of sexual abuse (offline as well as online) can be taught to stay safe online. This article summarizes the results of four different studies exploring these issues.  相似文献   
230.
This essay explores the contemporary fact of girls sexting. Instead of theoretically granting girls a form of technological sovereignty while sexting as sexual empowerment, it pauses to take a selfie of the adult subjects – parents, educators, and sex-positive feminists and queers – attached to this form of agency for girls. If sexuality remains an alluring reparative trap by offering, through a reverse discourse sustained by the plasticity of girlish whiteness, a way of transforming girls as objects into subjects, this essay problematizes that gesture as a racially normative one, reading it further alongside the relation of technology to sexual difference. To speculate on how the scenography of sexting could be seen differently by adults, this essay suspends the search for authentic meaning and knowledge, following an intuition that we cannot presently see anything behind the image of the sext. After examining how criminal law breaks the tension in the definition of “the girl” between vulnerability and agency by extending objectification through child-pornography law, the essay takes a speculative turn with feminist readings of the question of modern technology to consider the analytic and pedagogical purchase of the non-sovereignty of the girl who sexts.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号