首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   412篇
  免费   43篇
各国政治   8篇
工人农民   29篇
世界政治   9篇
外交国际关系   27篇
法律   183篇
中国共产党   15篇
中国政治   48篇
政治理论   42篇
综合类   94篇
  2024年   2篇
  2023年   14篇
  2022年   34篇
  2021年   19篇
  2020年   23篇
  2019年   18篇
  2018年   19篇
  2017年   16篇
  2016年   12篇
  2015年   16篇
  2014年   24篇
  2013年   43篇
  2012年   20篇
  2011年   15篇
  2010年   26篇
  2009年   17篇
  2008年   16篇
  2007年   24篇
  2006年   19篇
  2005年   20篇
  2004年   18篇
  2003年   11篇
  2002年   19篇
  2001年   7篇
  2000年   3篇
排序方式: 共有455条查询结果,搜索用时 15 毫秒
171.
Abstract: In the case study, two methods of performing body height measurements in images are compared based on projective geometry and 3D modeling of the crime scene. Accuracy and stability of height estimations are tested using reconstruction images of test persons of known height. Given unchanged camera settings, predictions of both methods are accurate. However, as the camera had been moved in the case, new vanishing points and camera matches had to be created for the reconstruction images. 3D modeling still yielded accurate and stable estimations. Projective geometry produced incorrect predictions for test persons and unstable intervals for questioned persons. The latter is probably caused by the straight lines in the field of view being hard to discern. With the quality of material presented, which is representative for our case practice, using vanishing points may thus yield unstable results. The results underline the importance of performing validation experiments in casework.  相似文献   
172.
Abstract: Recent trends in global networks are leading toward service‐oriented architectures and sensor networks. On one hand of the spectrum, this means deployment of services from numerous providers to form new service composites, and on the other hand this means emergence of Internet of things. Both these kinds belong to a plethora of realms and can be deployed in many ways, which will pose serious problems in cases of abuse. Consequently, both trends increase the need for new approaches to digital forensics that would furnish admissible evidence for litigation. Because technology alone is clearly not sufficient, it has to be adequately supported by appropriate investigative procedures, which have yet become a subject of an international consensus. This paper therefore provides appropriate a holistic framework to foster an internationally agreed upon approach in digital forensics along with necessary improvements. It is based on a top‐down approach, starting with legal, continuing with organizational, and ending with technical issues. More precisely, the paper presents a new architectural technological solution that addresses the core forensic principles at its roots. It deploys so‐called leveled message authentication codes and digital signatures to provide data integrity in a way that significantly eases forensic investigations into attacked systems in their operational state. Further, using a top‐down approach a conceptual framework for forensics readiness is given, which provides levels of abstraction and procedural guides embellished with a process model that allow investigators perform routine investigations, without becoming overwhelmed by low‐level details. As low‐level details should not be left out, the framework is further evaluated to include these details to allow organizations to configure their systems for proactive collection and preservation of potential digital evidence in a structured manner. The main reason behind this approach is to stimulate efforts on an internationally agreed “template legislation,” similarly to model law in the area of electronic commerce, which would enable harmonized national implementations in the area of digital forensics.  相似文献   
173.
Abstract: Sometimes the question arises whether it is possible to estimate the velocity of a speeding car recorded by closed circuit television cameras. By estimating the travelled distance of the car between two images and the time elapsed, estimation of the velocity is rather straightforward. However, to quantify the corresponding measurement uncertainty, the data analysis becomes more involved. The article describes two approaches as to how to derive the measurement uncertainty. In the first method, distance and timing are estimated separately, and the two uncertainties are combined to derive the measurement uncertainty for the velocity. For this, a frequentist and a Bayesian approach are described. In the second method, the measurement uncertainty for the speed is derived directly using validation recordings of a car driving by at known speed. The choice which method to use depends mainly on the length of the path that the car has travelled.  相似文献   
174.
The use of search engines and associated search functions to locate content online is now common practice. As a result, a forensic examination of a suspect's online search activity can be a critical aspect in establishing whether an offense has been committed in many investigations. This article offers an analysis of online search URL structures to support law enforcement and associated digital forensics practitioners interpret acts of online searching during an investigation. Google, Bing, Yahoo!, and DuckDuckGo searching functions are examined, and key URL attribute structures and metadata have been documented. In addition, an overview of social media searching covering Twitter, Facebook, Instagram, and YouTube is offered. Results show the ability to extract embedded metadata from search engine URLs which can establish online searching behaviors and the timing of searches.  相似文献   
175.
High dynamic range (HDR) imaging is a function that combines five images with different exposures into a single image. This technique may provide fine ridge details of fingerprint images for forensic latent fingerprint examination. Therefore, viewing fingerprints under optimal conditions is of paramount importance. This paper analyzes HDR and non‐HDR photos by using the Michelson contrast formula. The Michelson formula will provide a measurement to determine whether better contrast between the background and print can be achieved using the HDR function and if the background color affects the quality of the images. Two hypothesis were tested: (i) the HDR image provides more details of fingerprints with a better tone, greater clarity, and contrast than a normally exposed image regardless of the background color; (ii) the background color does not affect the quality of HDR fingerprint images overall, but the multi‐color background may increase the contrast of HDR fingerprint images in some cases.  相似文献   
176.
Communication apps can be an important source of evidence in a forensic investigation (e.g., in the investigation of a drug trafficking or terrorism case where the communications apps were used by the accused persons during the transactions or planning activities). This study presents the first evidence‐based forensic taxonomy of Windows Phone communication apps, using an existing two‐dimensional Android forensic taxonomy as a baseline. Specifically, 30 Windows Phone communication apps, including Instant Messaging (IM) and Voice over IP (VoIP) apps, are examined. Artifacts extracted using physical acquisition are analyzed, and seven digital evidence objects of forensic interest are identified, namely: Call Log, Chats, Contacts, Locations, Installed Applications, SMSs and User Accounts. Findings from this study would help to facilitate timely and effective forensic investigations involving Windows Phone communication apps.  相似文献   
177.
郭廓 《行政与法》2022,(2):35-41
数字农业是乡村振兴战略的重要发力点.以数字化引领农业农村现代化,能够让乡村振兴有"智"更有"质".吉林省在数字农业发展上已取得了一定的成效,但农业农村数字化发展仍总体滞后,城乡数字化发展不均衡、项目规划脱离实际、科技创新成果转化难等问题依然存在.新时期,吉林省应抓住产业数字化、数字产业化赋予的机遇,加快推进数字农业建设...  相似文献   
178.
齐宪生 《河北法学》2005,23(3):42-45
随着互联网技术的突飞猛进,电子商务在发达国家及国内开展得十分活跃,而电子商务合同作为电子商务运转的 重要基础和工具也被人们广泛运用,极大地推动了数字经济的发展。2005年4月1日我国第一部《电子签名法》 将正式实施,对于电子商务所涉及的电子交易安全问题,法院有了一部认定和裁决的法律依据。试图从电子商务 合同的特点及其订立和履行中所涉及的法律问题进行一些探讨。  相似文献   
179.
Digitally mediated communication technologies have fundamentally changed the problem of child sexual abuse. Sexually explicit images of young people that can be found online range from those documenting offline abuse including adult-to-child and peer-on-peer violence, to self-generated images including those taken within the context of a coercive relationship or those that are shared online beyond the taker's control. Online availability of these images can have serious effects on victims. It is vital to identify what victims need, how youngsters are at risk online, how self-generated images may be shared online beyond the taker's control, and how children who have been traumatized by experiences of sexual abuse (offline as well as online) can be taught to stay safe online. This article summarizes the results of four different studies exploring these issues.  相似文献   
180.
This essay explores the contemporary fact of girls sexting. Instead of theoretically granting girls a form of technological sovereignty while sexting as sexual empowerment, it pauses to take a selfie of the adult subjects – parents, educators, and sex-positive feminists and queers – attached to this form of agency for girls. If sexuality remains an alluring reparative trap by offering, through a reverse discourse sustained by the plasticity of girlish whiteness, a way of transforming girls as objects into subjects, this essay problematizes that gesture as a racially normative one, reading it further alongside the relation of technology to sexual difference. To speculate on how the scenography of sexting could be seen differently by adults, this essay suspends the search for authentic meaning and knowledge, following an intuition that we cannot presently see anything behind the image of the sext. After examining how criminal law breaks the tension in the definition of “the girl” between vulnerability and agency by extending objectification through child-pornography law, the essay takes a speculative turn with feminist readings of the question of modern technology to consider the analytic and pedagogical purchase of the non-sovereignty of the girl who sexts.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号