首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   70篇
  免费   9篇
各国政治   2篇
工人农民   3篇
世界政治   1篇
外交国际关系   3篇
法律   45篇
中国政治   2篇
政治理论   5篇
综合类   18篇
  2024年   1篇
  2022年   2篇
  2020年   2篇
  2019年   1篇
  2018年   3篇
  2017年   1篇
  2016年   4篇
  2015年   4篇
  2014年   5篇
  2013年   4篇
  2012年   3篇
  2011年   6篇
  2010年   7篇
  2009年   8篇
  2008年   3篇
  2007年   3篇
  2006年   3篇
  2005年   9篇
  2004年   4篇
  2003年   2篇
  2002年   2篇
  2000年   1篇
  1999年   1篇
排序方式: 共有79条查询结果,搜索用时 15 毫秒
11.
目的 采用超高效液相色谱-四级杆飞行时间质谱(ultra-performance liquid chromatogra-phy/quadrupole time-of-flight-tandem mass spectrometry,UPLC-Q-TOF/MS)对复方守宫散中化学成分及其血中移行成分进行定性分析,为该制剂的...  相似文献   
12.
目的 研究齿贝栓菌(Trametes cervina (Schw.) Bres)发酵液的化学成分.方法 齿贝栓菌发酵液的乙酸乙酯部位经硅胶、Rp-18、Sephadex LH-20等多种材料进行分离,波谱学鉴定化合物的化学结构.结果分离鉴定了10个化合物,分别为二甲异咯嗪(1)、麦角甾-7,22-二烯-3β,5α,6β...  相似文献   
13.
Through a comparison of fingermark sweat corrosion of α phase brass in both the U.K. and Iraq, we show how samples from Iraq have improved fingermark corrosion over U.K. samples that require no additional enhancement prior to visualization. Over 50% of Iraqi samples produced fingermark corrosion with full ridge detail compared with 0% from the U.K. X-ray photoelectron spectroscopy analysis of the fingermark corrosion products showed that Iraqi samples exhibit more dezincification with the Zn:Cu ratio averaging 1:1.82 compared with 1:3.07 for U.K. samples. Auger spectroscopy showed the presence of both zinc oxide and copper (I) oxide. No copper (II) was observed on the surface of the corroded brass. Opportunities to exploit the optical properties of these thin film oxides to enhance the visualization of fingermark corrosion are considered, and the potential to use fingermark corrosion of metal as a means of visualizing fingerprints in war zones is discussed.  相似文献   
14.
Abstract:  Effective removal of fingerprint deposits is crucial for experimentation related to the corrosion of metals by fingerprint deposits. Such removal is also necessary prior to deposition of test fingerprints. The effectiveness of four regimes in removing fingerprint deposits from brass is considered. Sustained wiping of the deposit with a tissue at applied pressures of up to c . 1430 Pa or rubbing while the brass was immersed in acetone both failed to remove completely all traces of fingerprint deposits. Heating the brass to 600°C was an effective remover; however, this also oxidized the surface of the metal except where inhibited by fingerprint deposits. The most effective regime, and the only one of the four that removed all traces of deposit without affecting the properties of the metal surface, was immersion in warm soapy water while rubbing with a tissue. We propose this as the preferred method for fingerprint removal.  相似文献   
15.
Abstract

Informed by Kaplan's general theory of deviant behavior it was hypothesized that adolescents characterized by deviant identities who developed negative self-feelings would decrease deviant behavior over time if the youths were bonded to the conventional social order but not if the youths were not bonded to the conventional social order. For adolescents not characterized by deviant identities, the development of negative self-feelings would increase deviant behavior over time regardless of the level of conventional social bonding.

The hypotheses were explored using data from youth (n=1019) tested during early adolescence and re-tested 3 years later. Ordinary least square regression models estimated the effects of negative self-feelings on later deviant behaviors controlling for earlier deviant behavior, gender, race/ethnicity, and father's education. The model was estimated separately for each of four subgroups: deviant identity/high social bonding; deviant identity/low social bonding; non-deviant identity/high social bonding; and non-deviant identity/low social bonding.

As hypothesized, negative self-feelings anticipated significant decreases in deviant behavior for the deviant identity/high social bonding group, but were unrelated to deviant behavior in the deviant identity/low social bonding group; and negative self-feelings anticipated increased deviant behavior in the two non-deviant identity groups regardless of the level of social bonding.  相似文献   
16.
An impressive number of inquiries across an array of methodological specifications has demonstrated that deviant peers are an important correlate of various criminological outcomes, which include within‐ individual change and stability in offending behavior. Still, the causal mechanisms of peer influence arguably remain underdeveloped (Giordano, 2003; Warr, 2002). In an attempt to expand the dialogue on the nature of peer influence, this inquiry proposes that scholars would benefit from considering relative peer deviance in addition to exposure to deviant peers. Specifically, it argues that an imbalance in delinquency between friends helps to explain delinquency change/stability; therefore, exposure to deviant peers is not always risky and exposure to less deviant peers is not always protective. The analysis uses the Add Health data to construct within‐individual and across‐individual (delinquency) difference scores and relies on self‐reports rather than on perceptions for the best friends' delinquency. The results provide support for the premise that adolescents attempt to achieve delinquency “balance” with their best friend by changing behavior, net of raw peer deviance levels (i.e., objective exposure). The findings also suggest that balance is not achieved through selection, given that the deviance gap between the respondent and his or her best friend does not predict friendship stability. The discussion considers these results from a theoretical and empirical perspective and offers several avenues for future research.  相似文献   
17.
虽然我国犯罪论构成的主要要素能够在德日的犯罪论构成中找到与之相对应的部分,但是由于我国与德日的犯罪论构成要素的角色定位不同,因此形成了构造不同的犯罪论体系,导致内容相同的犯罪论构成要素在整个犯罪论体系中的作用方式出现差异,使我国与德日的犯罪论构成表现出入罪功能与出罪功能的不同。  相似文献   
18.
This article asserts that the deviant case method offers a potential avenue for enhancing theory directed at explaining crime by using more available information to better connect the process of analyzing cases with that of explanatory refinement and elaboration. This approach has facilitated theoretical development in other social sciences and has proven useful where applied in criminological inquiry. Extant research is reviewed, and an empirical example is presented to demonstrate how this approach might be operationalized in criminological inquiry using quantitative methods. Conclusions relevant to future research are considered.  相似文献   
19.
不解救被拐卖、绑架妇女、儿童罪和阻碍解救被拐卖、绑架妇女、儿童罪的犯罪客体是国家机关解救被拐卖妇女、儿童的正常活动;犯罪主体是负有解救被拐卖妇女、儿童职责的国家机关工作人员,具体包括各级人民政府中主管解救工作的工作人员、公安机关中的工作人员,以及负有会同公安机关解救被拐卖妇女、儿童职责的其他单位中的工作人员。不解救被拐卖、绑架妇女、儿童罪的主观罪过形式既可以是故意,也可以是过失;阻碍解救被拐卖、绑架妇女儿童罪的主观罪过形式是故意。对本类犯罪的客观方面应结合最高人民检察院《关于渎职侵权犯罪案件立案标准的规定》的相关规定来理解。  相似文献   
20.
论我国刑法中的计算机犯罪   总被引:5,自引:0,他引:5  
本文首先阐明计算机犯罪的概念和基本特点,提出狭义和广义计算机犯罪的定义。依据犯罪构成理论分析我国刑法中的非法侵入计算机信息系统罪和破坏计算机信息系统罪,以及认定这两种犯罪应当注意的若干问题。并根据其他计算机犯罪的基本特征,归纳出其可能触犯刑法中的若干罪名。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号