全文获取类型
收费全文 | 416篇 |
免费 | 41篇 |
专业分类
各国政治 | 8篇 |
工人农民 | 29篇 |
世界政治 | 9篇 |
外交国际关系 | 27篇 |
法律 | 184篇 |
中国共产党 | 15篇 |
中国政治 | 48篇 |
政治理论 | 43篇 |
综合类 | 94篇 |
出版年
2024年 | 3篇 |
2023年 | 14篇 |
2022年 | 34篇 |
2021年 | 19篇 |
2020年 | 24篇 |
2019年 | 18篇 |
2018年 | 19篇 |
2017年 | 16篇 |
2016年 | 12篇 |
2015年 | 16篇 |
2014年 | 24篇 |
2013年 | 43篇 |
2012年 | 20篇 |
2011年 | 15篇 |
2010年 | 26篇 |
2009年 | 17篇 |
2008年 | 16篇 |
2007年 | 24篇 |
2006年 | 19篇 |
2005年 | 20篇 |
2004年 | 18篇 |
2003年 | 11篇 |
2002年 | 19篇 |
2001年 | 7篇 |
2000年 | 3篇 |
排序方式: 共有457条查询结果,搜索用时 0 毫秒
151.
运用数码相机进行分色偏振光摄影 总被引:1,自引:0,他引:1
目的研究运用数码相机进行分色偏振光摄影的可能性和方法。方法比较用数码相机拍摄有色地毯上的灰尘鞋印的各种方法的效果。结果分色偏振光摄影方法得到了较理想的效果。结论用数码相机进行分色偏振光摄影是有效的 ,相对传统方法提高了工作效率。 相似文献
152.
Hadas Eyal 《政治交往》2016,33(1):118-135
Two important and understudied dimensions of the interaction between politics and the digital revolution are the impact of digital technology on the ability of nongovernmental organizations (NGOs) to win more media coverage and to successfully influence the political processes. This original quantitative comparison of 50 Israeli NGOs examined two main issues: the impact of technology on the ability of organizations to achieve mass media and political success and whether some groups are better positioned than others to exploit technology to their advantage. A theoretical concept labeled digital fit was introduced and put to a statistical test using data from a survey of 50 NGO leaders and a survey of 15 key politicians who were asked to rank the political impact of organizations they are familiar with from relevant parliamentary committees they are members of. Digital fit is defined as a cluster of digitally related variables that puts political actors in a better position to harness digital technology to self-produce and self-distribute multimedia messages for the purpose of advocating their cause to mass media outlets and politicians. A prospective dimension of digital fit is its potential to stimulate power shifts between the old guard of successful political-communication actors and a new breed of successful challengers. Results showed that digital fit had a strong positive direct effect on mass media success and a mediated influence on political success. There are positive signs that conventional models are shifting in a way that empowers new political actors. 相似文献
153.
Relatively Permanent Pigmented or Vascular Skin Marks for Identification: A Pilot Reliability Study 下载免费PDF全文
Arfika Nurhudatiana Ph.D. Adams Wai‐Kin Kong Ph.D. Noah Craft M.D. Ph.D. Hong Liang Tey M.B.B.S M.R.C.P. 《Journal of forensic sciences》2016,61(1):52-58
In child sexual exploitation offenses, the collected evidence images often show the skin of nonfacial body parts of the criminals and victims. For identification in this scenario, “relatively permanent pigmented or vascular skin marks,” abbreviated as RPPVSM, were recently introduced as the basis for a novel biometric trait. This pilot study evaluated the interexaminer variability of RPPVSM identification. Four dermatology physicians were recruited to examine RPPVSM from 75 skin images collected from a total of 51 Caucasian and Asian subjects. The images were separated into 50 reference (“suspect”) images and 25 evaluation (“evidence”) images. The examiners were asked to perform identification by annotating RPPVSM in each of the 25 evaluation images and matching them with the reference images. The rate of misidentification was 0% while the mean rate at which examiners failed to find a match was 6%, indicating the potential of dermatology physicians performing the role of RPPVSM examiners. 相似文献
154.
The post-attendee Uniform Resource Locator (URL) feature within the video conferencing application known as Zoom is often overlooked by digital forensic experts as a potential risk for malware transmission. However, with the ability to redirect webinar participants to any URL set by the host for the webinar, the post-attendee URL can be abused by bad actors to expose webinar participants to malicious websites or, in the worst-case scenario, force participants to download a file through the use of a direct download link URL. This study aims to showcase how this exploit can be replicated by creating an experimental environment involving four Windows 10 desktops running Zoom version 5.7.5 and creating a webinar with four user accounts acting as webinar participants and setting the post-attendee URL value to the URL of a website that contained a keylogger. In another trial, the same experimental environment was utilized, with the only difference being the post-attendee URL that was set to redirect webinar participants to a download link for a .jpg file. In both instances, every user account that joined the webinar via clicking on the invitation link that was emailed to each user account after registering for the webinar was redirected to the post-attendee URL regardless of their user account role. These results not only prove that the post-attendee URL can be exploited, but also provide insight as to how this type of attack can be prevented. 相似文献
155.
期刊数字化出版作为一种新的出版方式,它正以其信息容量大、传播速度快、检索便捷等诸多优点,日益受到读者的青睐。然而,网络的广泛性和开放性,使得侵权轻而易举。在此背景下,作者、传统期刊的主办者、网络出版商三方在增强著作权保护意识的同时,签订合同,理清各自的权利和义务,同时采取有力的技术防范措施,以适应新形势下著作权保护的新特点。 相似文献
156.
On 7th January 2013 the Anonymous hacking collective launched a White House petition asking the Obama administration to recognize DDoS1 attacks as a valid form of protest, similar to the Occupy protests. The ‘Occupy’ movement against financial inequality has become an international protest phenomenon stirring up the debate on the legal responses to acts of civil disobedience. At the same time, online attacks in the form of DDoS are considered by many as the digital counterparts of protesting. While the law generally acknowledges a certain level of protection for protesting as a manifestation of the rights to free speech and free assembly, it is still unclear whether DDoS attacks could qualify as free speech. This paper examines the analogies between offline protests and DDoS attacks, discusses legal responses in both cases and seeks to explore the scope for free speech protection. 相似文献
157.
ZHANG Shouwen 《Frontiers of Law in China》2022,17(3):334
Although the development of the digital economy has not changed the basic principles and theories of economic law, it has impacted its related specific theories. Thus, it is particularly necessary to further develop its space theory, entity theory and behavior theory, since space, entity and behavior are the three key factors affecting its application scope. Furthermore, “space diversification,” “entity online platform” and “behavior informatization” based on the digital economy, have created new regulatory issues and need the above specific developments, based on which the modulation theory, information theory, risk theory and rule of law theory of economic law can then also be further developed. Thus, all these developments combined are conducive to advancing the economic-law’s operation theory, norm theory, as well as the ontological and axiological research. In addition, such developments are conducive to strengthening the convincing power and guiding power of economic law theories for the rule of law construction related to the digital economy, to promoting a new development landscape and a modern economic system, and to realizing Chinese modernization. 相似文献
158.
张靓 《辽宁公安司法管理干部学院学报》2014,(3):120-121
随着现代教学理念和教育技术不断发展变化,高职公共英语教学借助网络多媒体的优势,提高了学生的学习兴趣,但也存在一定的问题。在分析其优势和问题的基础上,提出构建高职英语教学新模式的一些要素。 相似文献
159.
MARTIN MOORE 《The Political quarterly》2014,85(2):125-132
This collection of pieces addresses questions raised by the Snowden revelations and their aftermath. All the authors were participants at a round‐table discussion at King's College London on Thursday 20 March 2014. The round table was chaired jointly by Sir Lawrence Freedman and Lord [Peter] Hennessy. Those participating were: Baroness [Onora] O'Neill, Lord [Ken] Macdonald, Nigel Inkster, Professor Thomas Rid (King's College), Ewen MacAskill (The Guardian), Gordon Corera (BBC), Jemima Stratford QC, Peter Horrocks (BBC), Charlie Edwards (RUSI), Professor Jean Seaton (Westminster University), Bill Peace (King's, ex‐SOCA), Air Vice‐Marshal Andrew Vallance (DA‐Notice), Carl Miller (DEMOS/King's), Lord (Alex) Carlile and Richard Sambrook (Cardiff University). The round table was organised by Martin Moore, director of the Media Standards Trust, and Benedict Wilson, lecturer in Defence Studies at King's and Research Associate at KPI. It was a joint Media Standards Trust–King's Policy Institute Event. For more information please contact martin.moore@mediastandardstrust.org or benedict.wilson@kcl.ac.uk . 相似文献
160.
During the COVID-19 pandemic, the United States released the CDC-issued vaccination card to document the status of immunizations. It eventually was used as a verification system to allow patrons to safely access public venues. This is/was apparently a simple printed piece of paper with minimal security features which made it an easy target for counterfeiters with little expertise required. Those unvaccinated who wished to enter areas that required proof of the COVID-19 vaccine were soon finding alternative illegal methods to do so which led to public health concerns. This research was divided into two parts. Part A aimed to forensically identify the security features with a video spectral comparator and a stereomicroscope. Ten “known” blank cards were collected directly from dispensaries that administered the vaccine and 68 “unknowns” from individuals who received the COVID-19 vaccine. Part B aimed to evaluate the authentication systems employed by countries outside the United States to propose a model on how the vaccination card could be improved and what security features should be included for future instances requiring proof of immunization. The results revealed the CDC document was produced with minimal security features making the document prone to counterfeiting. Furthermore, based on the information collected from other countries' vaccination certificates, it is recommended to develop a dual authentication system, with digital and printable aspects, that contains a QR code linked to a database. Other security features may include a non-optical brightener substrate, security fibers, a watermarked logo, offset printing, and a geographical color-coded system. 相似文献