首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   23篇
  免费   1篇
工人农民   3篇
世界政治   4篇
外交国际关系   7篇
法律   4篇
政治理论   5篇
综合类   1篇
  2023年   1篇
  2020年   2篇
  2019年   1篇
  2018年   4篇
  2017年   1篇
  2016年   3篇
  2015年   1篇
  2013年   7篇
  2011年   1篇
  2010年   1篇
  2006年   1篇
  2005年   1篇
排序方式: 共有24条查询结果,搜索用时 15 毫秒
21.
This article looks at Internet use by insurgent groups in the North Caucasus in the context of a regional diffusion of violence. Using a mixed methods research design that combines hyperlink network analysis and micro-discourse analysis, it examines the online characteristics of the Caucasus Emirate and the main frames conveyed by the websites affiliated with the Emirate. It demonstrates the existence of a network of cross-referencing websites that, collectively, articulate the Emirate's political agenda online and allow for the dissemination of frames across the Web. It also shows that while jihadism provides a cultural resource that fosters a global sense of community, the jihadization of discourse does not eradicate local references as the local dynamics of the conflict have a strong impact on online communicative strategies. Finally, although based on a specific case study, this article highlights the potential of a mixed methods research design as applied to an analysis of virtual insurgent networks.  相似文献   
22.
Abstract

Proponents of Gov2.0 claim that it offers the potential to improve the relationship between the citizen and state. Whether this potential can be realised depends in part on how new web-based technologies are implemented. Local government officials and politicians are important actors in this process, yet we know little about how they view Gov2.0. This paper applies Q-methodology to a sample of English local government actors to generate new data and fill this gap in our knowledge. Four frames of reference within this population are revealed: Sunlight on Government, Cautious Crowdsourcers, Gov1.0 and Platform Providers. The paper concludes that while there is general agreement that technology will be a driver of change, and that local government should adapt, there is no clear agreement as to the nature of reform.  相似文献   
23.
The purpose of this article was to question whether interest group actions during the pre‐proposal stage of U.S. federal rulemaking influences the language proposed in natural resource agency rules. The influence of interest groups during this stage was examined across three case studies: (1) the United States Fish and Wildlife Service (USFWS) critical habitat designation for Nebraska's Salt Creek tiger beetle, (2) the USFWS critical habitat designation for the Utah/Arizona Shivwits and Holmgren milk vetch, and (3) the USFWS delisting of the Northern Rocky Mountain gray wolf population from the endangered species list. To analyze these three cases, a frame analysis approach is used and offers evidence to support the proposition that the instructive, expertise, and fiscal feasibility frames that stakeholders used during the pre‐proposal stage can shape the language of a Notice of Proposed Rulemaking. These cases suggest the rich potential for careful study of the earliest stages in the regulatory and administrative rulemaking process in the United States and beyond.  相似文献   
24.
Nowadays, surveillance systems are used to control crimes. Therefore, the authenticity of digital video increases the accuracy of deciding to admit the digital video as legal evidence or not. Inter‐frame duplication forgery is the most common type of video forgery methods. However, many existing methods have been proposed for detecting this type of forgery and these methods require high computational time and impractical. In this study, we propose an efficient inter‐frame duplication detection algorithm based on standard deviation of residual frames. Standard deviation of residual frame is applied to select some frames and ignore others, which represent a static scene. Then, the entropy of discrete cosine transform coefficients is calculated for each selected residual frame to represent its discriminating feature. Duplicated frames are then detected exactly using subsequence feature analysis. The experimental results demonstrated that the proposed method is effective to identify inter‐frame duplication forgery with localization and acceptable running time.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号