首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   876篇
  免费   68篇
各国政治   29篇
工人农民   21篇
世界政治   35篇
外交国际关系   66篇
法律   469篇
中国共产党   7篇
中国政治   76篇
政治理论   101篇
综合类   140篇
  2024年   4篇
  2023年   22篇
  2022年   32篇
  2021年   51篇
  2020年   60篇
  2019年   41篇
  2018年   61篇
  2017年   41篇
  2016年   32篇
  2015年   30篇
  2014年   69篇
  2013年   90篇
  2012年   78篇
  2011年   34篇
  2010年   33篇
  2009年   36篇
  2008年   55篇
  2007年   35篇
  2006年   26篇
  2005年   29篇
  2004年   12篇
  2003年   18篇
  2002年   13篇
  2001年   14篇
  2000年   7篇
  1999年   5篇
  1998年   1篇
  1997年   2篇
  1995年   1篇
  1994年   2篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1987年   1篇
  1986年   1篇
  1985年   2篇
  1983年   3篇
排序方式: 共有944条查询结果,搜索用时 0 毫秒
931.
我国控辩关系失衡由来已久:规范维度上,立法滞后、保障不力;实证维度上,控方一家独大,辩方权利萎缩;观念维度上,长期权力本位,辩护权倍受歧视。新型控辩关系构建,须从参与、对话、共享三方面入手。其中,参与机制需要从制度上保证辩护人全程、全面、立体化介入诉讼;对话机制源于戴维·伯姆的对话理论,通过控辩对话消除侦控过程的思维碎片化,建立互信、强化协作;信息共享机制源于信息不对称引发的司法寻租,须构建以控方为主、辩方为补充的信息披露义务,让各方在公开透明的司法程序中公平竞技。  相似文献   
932.
Bashing of juvenile justice systems in the United States is commonplace. We wondered if this is justified. As a product of our everyday practice and academic assessment, this article draws attention to salutary developments on several fronts, including reduced confinement, systematic assessment of child risks and needs, including use of structured decision‐making tools, evidence based services, and construction of comprehensive service plans. Our goal is to draw attention to best practices such as these that can lead to further advancements in juvenile justice systems.  相似文献   
933.
While interest in using 3D scanning technology for crime scene investigation (CSI) has grown in recent years, a number of barriers still remain that prevent its wide adoption in the criminal justice system. One such barrier comes from the lack of tools that can validate a 3D scan and verify that it has not been manipulated. While a great deal of research has gone into the detection of manipulations for 2D images, the detection of manipulations for 3D scenes has yet to be fully realized.This paper introduces a series of techniques to detect if a 3D point cloud generated from a LiDAR scan has been subsequently manipulated. These techniques exploit fundamental structures inherent in the collection and storage of these types of data. While the proposed techniques are able to detect a number of different types of manipulations, their limitations are also discussed. The goal of this work is to provide a foundation for the creation of a validation toolkit that can ensure 3D scan data is valid and unaltered.  相似文献   
934.
Naval power is a crucial element of state power, yet existing naval data sets are limited to a small number of states and ship types. Here we present 147 years of naval data on all the world’s navies from 1865 to 2011. This country-year data set focuses on warships with ship-based weapons capable of using kinetic force to inflict damage on other structures or peoples. After identifying a country’s active naval forces, we create a measure of naval power based on the aggregate tonnage of the active ships. Additionally, we create count variables for ship types such as aircraft carriers or battleships. This article introduces the country-year data, describes variables of interests for use in country-year, dyadic, or systemic studies, and suggests potential questions of interest scholars could explore using the naval power data set.  相似文献   
935.
With more and more attention being paid to the employment problem of university students, the employment quality and employment performance evaluation of university graduates has become a hot topic of discussion. As the evaluation of employment quality and employment performance is a multidimensional and comprehensive evaluation and difficult to measure with a single indicator, this paper establishes a set of performance evaluation index system on the basis of taking into account all stakeholders and divides them into two categories: input and output. Finally, a comprehensive evaluation index of employment performance is obtained with the use of the data envelopment analysis model.  相似文献   
936.
《国际相互影响》2012,38(4):273-301
Empirical examination of individual-level survey data on national identity, in general, reveals a significant relationship between religious affiliation and an individual's international-policy preferences and that this relationship varies across Protestant denominations. Specifically, we test attitudes toward import and immigration policies, the role of international institutions, and unilateral policy actions. The empirical results indicate that individuals affiliated with conservative Protestant denominations are more likely to support positions on international issues that can be regarded as consistent with the anti-globalist right. We also find evidence of a reinforcing regional effect among conservatives in the south, and differences in the preferences of Baptist and non-Baptist African Americans.  相似文献   
937.
俄罗斯电信产业近年来发展迅速,突出表现在移动通信、卫星通信、宽带服务等方面,但同时也出现了增长速度放缓、产业标准不统一、对外开放度下降等问题,尽管如此,俄罗斯志在建设欧亚数字枢纽的雄心未变。  相似文献   
938.
The present study describes the quality of psychiatric care among forensic inpatients in Denmark who answered the Danish version of the Quality in Psychiatric Care–Forensic In-Patient (QPC–FIP) instrument. A sample of 143 patients (response rate 53%) from 25 of the 27 specialized forensic units in Denmark participated in the study. The patients’ ratings of the quality of care were generally high. The highest rating was found for the quality of the secluded environment and the lowest for patient participation in the care. The results showed that several factors influenced the patients’ ratings. Women rated the quality of care lower in comparison to men. Patients living together with someone before admission, patients with a lower level of education, and patients who were better informed regarding their diagnosis, who was the responsible physician, and where to complain rated the quality of care higher. We can recommend the use of the Danish version of the QPC–FIP instrument for measuring and improving the quality of care in forensic inpatient care.  相似文献   
939.
Although research on terrorism has grown rapidly in recent years, few scholars have applied criminological theories to the analysis of individual‐level political extremism. Instead, researchers focused on radicalization have drawn primarily from political science and psychology and have overwhelmingly concentrated on violent extremists, leaving little variation in the dependent variable. With the use of a newly available data set, we test whether variables derived from prominent criminological theories are helpful in distinguishing between nonviolent and violent extremists. The results show that variables related to social control (lack of stable employment), social learning (radical peers), psychological perspectives (history of mental illness), and criminal record all have significant effects on participation in violent political extremism and are robust across multiple techniques for imputing missing data. At the same time, other common indicators of social control (e.g., education and marital status) and social learning perspectives (e.g., radical family members) were not significant in the multivariate models. We argue that terrorism research would benefit from including criminology insights and by considering political radicalization as a dynamic, evolving process, much as life‐course criminology treats more common forms of crime.  相似文献   
940.
In November 2016, China passed its first Cybersecurity Law, aiming to strengthen cyberspace governance through a number of initiatives, including Internet operator security protection, personal information protection, special protection of critical information infrastructure, local storage of data, and security evaluation for data export. This Article discusses the major concepts and principles of the Cybersecurity Law. It also discusses the tensions and controversies inherent in the law. All in all, the Cybersecurity Law exhibits distinctive Chinese characteristics. It is premised on the concept of cyberspace sovereignty and emphasizes security over free flow of data and freedom of speech. It provides a basic legal framework for cyberspace governance in China, to be supplemented by implementing regulations in years to come.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号