全文获取类型
收费全文 | 70篇 |
免费 | 9篇 |
专业分类
各国政治 | 2篇 |
工人农民 | 3篇 |
世界政治 | 1篇 |
外交国际关系 | 3篇 |
法律 | 45篇 |
中国政治 | 2篇 |
政治理论 | 5篇 |
综合类 | 18篇 |
出版年
2024年 | 1篇 |
2022年 | 2篇 |
2020年 | 2篇 |
2019年 | 1篇 |
2018年 | 3篇 |
2017年 | 1篇 |
2016年 | 4篇 |
2015年 | 4篇 |
2014年 | 5篇 |
2013年 | 4篇 |
2012年 | 3篇 |
2011年 | 6篇 |
2010年 | 7篇 |
2009年 | 8篇 |
2008年 | 3篇 |
2007年 | 3篇 |
2006年 | 3篇 |
2005年 | 9篇 |
2004年 | 4篇 |
2003年 | 2篇 |
2002年 | 2篇 |
2000年 | 1篇 |
1999年 | 1篇 |
排序方式: 共有79条查询结果,搜索用时 15 毫秒
11.
目的 采用超高效液相色谱-四级杆飞行时间质谱(ultra-performance liquid chromatogra-phy/quadrupole time-of-flight-tandem mass spectrometry,UPLC-Q-TOF/MS)对复方守宫散中化学成分及其血中移行成分进行定性分析,为该制剂的... 相似文献
12.
13.
Through a comparison of fingermark sweat corrosion of α phase brass in both the U.K. and Iraq, we show how samples from Iraq have improved fingermark corrosion over U.K. samples that require no additional enhancement prior to visualization. Over 50% of Iraqi samples produced fingermark corrosion with full ridge detail compared with 0% from the U.K. X-ray photoelectron spectroscopy analysis of the fingermark corrosion products showed that Iraqi samples exhibit more dezincification with the Zn:Cu ratio averaging 1:1.82 compared with 1:3.07 for U.K. samples. Auger spectroscopy showed the presence of both zinc oxide and copper (I) oxide. No copper (II) was observed on the surface of the corroded brass. Opportunities to exploit the optical properties of these thin film oxides to enhance the visualization of fingermark corrosion are considered, and the potential to use fingermark corrosion of metal as a means of visualizing fingerprints in war zones is discussed. 相似文献
14.
Emma Paterson ; John W. Bond D.Phil. ; A. Robert Hillman D.Phil. 《Journal of forensic sciences》2010,55(1):221-224
Abstract: Effective removal of fingerprint deposits is crucial for experimentation related to the corrosion of metals by fingerprint deposits. Such removal is also necessary prior to deposition of test fingerprints. The effectiveness of four regimes in removing fingerprint deposits from brass is considered. Sustained wiping of the deposit with a tissue at applied pressures of up to c . 1430 Pa or rubbing while the brass was immersed in acetone both failed to remove completely all traces of fingerprint deposits. Heating the brass to 600°C was an effective remover; however, this also oxidized the surface of the metal except where inhibited by fingerprint deposits. The most effective regime, and the only one of the four that removed all traces of deposit without affecting the properties of the metal surface, was immersion in warm soapy water while rubbing with a tissue. We propose this as the preferred method for fingerprint removal. 相似文献
15.
Abstract Informed by Kaplan's general theory of deviant behavior it was hypothesized that adolescents characterized by deviant identities who developed negative self-feelings would decrease deviant behavior over time if the youths were bonded to the conventional social order but not if the youths were not bonded to the conventional social order. For adolescents not characterized by deviant identities, the development of negative self-feelings would increase deviant behavior over time regardless of the level of conventional social bonding. The hypotheses were explored using data from youth (n=1019) tested during early adolescence and re-tested 3 years later. Ordinary least square regression models estimated the effects of negative self-feelings on later deviant behaviors controlling for earlier deviant behavior, gender, race/ethnicity, and father's education. The model was estimated separately for each of four subgroups: deviant identity/high social bonding; deviant identity/low social bonding; non-deviant identity/high social bonding; and non-deviant identity/low social bonding. As hypothesized, negative self-feelings anticipated significant decreases in deviant behavior for the deviant identity/high social bonding group, but were unrelated to deviant behavior in the deviant identity/low social bonding group; and negative self-feelings anticipated increased deviant behavior in the two non-deviant identity groups regardless of the level of social bonding. 相似文献
16.
JEAN MARIE MCGLOIN 《犯罪学》2009,47(2):439-477
An impressive number of inquiries across an array of methodological specifications has demonstrated that deviant peers are an important correlate of various criminological outcomes, which include within‐ individual change and stability in offending behavior. Still, the causal mechanisms of peer influence arguably remain underdeveloped (Giordano, 2003; Warr, 2002). In an attempt to expand the dialogue on the nature of peer influence, this inquiry proposes that scholars would benefit from considering relative peer deviance in addition to exposure to deviant peers. Specifically, it argues that an imbalance in delinquency between friends helps to explain delinquency change/stability; therefore, exposure to deviant peers is not always risky and exposure to less deviant peers is not always protective. The analysis uses the Add Health data to construct within‐individual and across‐individual (delinquency) difference scores and relies on self‐reports rather than on perceptions for the best friends' delinquency. The results provide support for the premise that adolescents attempt to achieve delinquency “balance” with their best friend by changing behavior, net of raw peer deviance levels (i.e., objective exposure). The findings also suggest that balance is not achieved through selection, given that the deviance gap between the respondent and his or her best friend does not predict friendship stability. The discussion considers these results from a theoretical and empirical perspective and offers several avenues for future research. 相似文献
17.
曹希国 《河南公安高等专科学校学报》2005,(3):18-21
虽然我国犯罪论构成的主要要素能够在德日的犯罪论构成中找到与之相对应的部分,但是由于我国与德日的犯罪论构成要素的角色定位不同,因此形成了构造不同的犯罪论体系,导致内容相同的犯罪论构成要素在整个犯罪论体系中的作用方式出现差异,使我国与德日的犯罪论构成表现出入罪功能与出罪功能的不同。 相似文献
18.
CHRISTOPHER J. SULLIVAN 《犯罪学》2011,49(3):905-920
This article asserts that the deviant case method offers a potential avenue for enhancing theory directed at explaining crime by using more available information to better connect the process of analyzing cases with that of explanatory refinement and elaboration. This approach has facilitated theoretical development in other social sciences and has proven useful where applied in criminological inquiry. Extant research is reviewed, and an empirical example is presented to demonstrate how this approach might be operationalized in criminological inquiry using quantitative methods. Conclusions relevant to future research are considered. 相似文献
19.
不解救被拐卖、绑架妇女、儿童罪和阻碍解救被拐卖、绑架妇女、儿童罪的犯罪客体是国家机关解救被拐卖妇女、儿童的正常活动;犯罪主体是负有解救被拐卖妇女、儿童职责的国家机关工作人员,具体包括各级人民政府中主管解救工作的工作人员、公安机关中的工作人员,以及负有会同公安机关解救被拐卖妇女、儿童职责的其他单位中的工作人员。不解救被拐卖、绑架妇女、儿童罪的主观罪过形式既可以是故意,也可以是过失;阻碍解救被拐卖、绑架妇女儿童罪的主观罪过形式是故意。对本类犯罪的客观方面应结合最高人民检察院《关于渎职侵权犯罪案件立案标准的规定》的相关规定来理解。 相似文献
20.
论我国刑法中的计算机犯罪 总被引:5,自引:0,他引:5
本文首先阐明计算机犯罪的概念和基本特点,提出狭义和广义计算机犯罪的定义。依据犯罪构成理论分析我国刑法中的非法侵入计算机信息系统罪和破坏计算机信息系统罪,以及认定这两种犯罪应当注意的若干问题。并根据其他计算机犯罪的基本特征,归纳出其可能触犯刑法中的若干罪名。 相似文献