首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   478篇
  免费   30篇
工人农民   1篇
世界政治   3篇
外交国际关系   58篇
法律   300篇
中国共产党   3篇
中国政治   42篇
政治理论   6篇
综合类   95篇
  2023年   12篇
  2022年   4篇
  2021年   9篇
  2020年   22篇
  2019年   17篇
  2018年   14篇
  2017年   13篇
  2016年   20篇
  2015年   14篇
  2014年   26篇
  2013年   56篇
  2012年   25篇
  2011年   30篇
  2010年   26篇
  2009年   23篇
  2008年   36篇
  2007年   39篇
  2006年   32篇
  2005年   20篇
  2004年   20篇
  2003年   14篇
  2002年   11篇
  2001年   9篇
  2000年   5篇
  1999年   2篇
  1997年   2篇
  1996年   1篇
  1992年   2篇
  1990年   1篇
  1988年   1篇
  1985年   1篇
  1984年   1篇
排序方式: 共有508条查询结果,搜索用时 15 毫秒
81.
为了检测牛传染性鼻气管炎病毒,本研究建立了牛传染性鼻气管炎病毒SYBR Green I实时荧光定量PCR检测方法。通过设计特异性引物扩增病毒基因,将扩增的目的片段(119 bp)连接到pMD19-T载体中,构建重组质粒。将重组质粒作为阳性标准品,用于SYBR Green I实时荧光定量PCR检测方法的建立。结果显示,特异性引物扩增的目的片段约为119 bp,符合预期的大小,经测序鉴定所扩增的目的片段正确。敏感性结果显示,用该方法检测阳性质粒标准品的最低限度为3.04 X101 copies/mL,是Nano-PCR的10倍。将牛病毒性腹泻病毒、牛呼吸道合胞体病毒、牛副流感病毒3型与牛传染性鼻气管炎病毒进行特异性检测。结果显示,只有牛传染性鼻气管炎病毒被检测到,其他病毒均未有特异性的扩增曲线,表明该方法的特异性良好。批内和批间重复变异系数均小于1%,显示该方法具有良好的重复性。用建立的方法对20份疑似IBRV的临床样品进行检测,并与Nano-PCR检测方法进行对比,结果显示本方法的阳性样晶率高于Nano-PCR检测方法。本研究建立的牛传染性鼻气管炎病毒SYBR Green I实时荧光定量PCR方法特异性好、灵敏度高、重复性好,可用于牛传染性鼻气管炎病毒的检测。  相似文献   
82.
视频侦查技术工作的现状和思考   总被引:1,自引:0,他引:1  
视频侦查技术是继刑侦、技侦、网侦之后的第四大侦查技术,给公安工作带来了新的破案技术支撑和增长点.视频侦查技术是强化社会治安控制的有效手段,对提高侦查机关打击犯罪的效能具有重大意义.尽快将这一新兴的侦查技术广泛应用到公安实战,发挥其巨大作用,是当前研究的重点.  相似文献   
83.
新修正的《刑事诉讼法》在许多方面对侦查工作加强了制约监督,切实体现了尊重和保障人权理念。侦查机关和侦查人员应当顺应时势,牢记尊重和保障人权,转变旧的侦查理念和模式,积极适应侦查阶段律师辩护人身份的确立,不断提高侦查工作质量,切实提高新形势下诉讼效益。这无论从查明案情,还是从打击犯罪方面以及提高侦查公信力方面来说都是非常必要的,而且是非常迫切的。  相似文献   
84.
Detection of blood on dark materials is difficult for crime scene examiners so presumptive tests are used to assist. This study compared the ability of luminol, leuko crystal violet, tetramethylbenzidine, and Combur Test®E to detect whole, diluted blood (1:100) and a key‐shaped blood transfer stain (1:10), on dark cotton sheeting, tea towel, socks, synthetic carpet, and car mats. Powdered bleach was used to evaluate specificity of the blood detection tests. Sensitivity, specificity, positive predictive value (PPV), negative predictive value (NPV), and overall misclassification rate (OMR) assessed the quality of the blood tests. Luminol was the preferred test for diluted blood having the highest sensitivity (79%–96%), NPV (66%–93%), and the lowest OMR (3%–15%). Luminol was also found to be most efficient with a testing time on 25 items of 2 h 50 min compared with up to 8 h. Overall, luminol was the most effective method, also providing information on bloodstain patterns.  相似文献   
85.
This study focuses on the trust that potential jurors have in unsubstantiated evidence and the implications of such trust for legal decision-making. We examined whether participants’ motivation to think deeply (‘need for cognition,’ NC) and belief in science moderated their trust in potentially fallible detection dog evidence when selecting a verdict in a trial scenario. A detection dog twice indicated the presence of drugs in the scenario, yet no drugs were actually found. Those who chose a guilty verdict without drugs present featured stronger beliefs in detection dog evidence. They were also more confident that a dog alert indicated the presence of drugs, even though the scientific literature actually shows that detection dog evidence is subject to biases and other challenges to reliability. Our findings indicate that an unsubstantiated belief and trust in detection dog evidence may negatively influence juror decision-making, which may, in turn, pose consequences for fairness and justice. Participants believed that detection dogs provide powerful and reliable evidence, and these beliefs were clearly associated with stronger beliefs in science. These findings, therefore, raise serious concerns about jurors’ indiscriminate trust in forensic evidence, be it detection dog evidence or other lines of evidence presented in court.  相似文献   
86.
Detection of latent fingermarks on various substrates is critical in crime investigations. Conventional chemical methods using reagents could contaminate or even destruct biological information of samples. Here, an optical method and successful case application of detecting latent fingermarks through long‐wave ultraviolet (UV) fluorescence (300–400 nm) by shortwave UV laser excitation is reported. Experimental results indicate that the recovery rate of the latent fingermarks on various paper items is in the range of 70–80% without chemical treatments. Moreover, the optical method allows for the preservation of samples for further examination, such as polymerase chain reaction (PCR) testing. The technique has also been successfully applied to a criminal case in identifying the suspect, which, to the best of our knowledge, has never been reported in real crime investigations. Therefore, such a method as UV‐excited UV fluorescence in detecting latent fingermarks may be better for examination in cases where biological information of samples is needed for consequent testing.  相似文献   
87.
Detection of canines are well‐known to be valuable in the location of contraband, such as explosives or narcotics. More recently, canines have been trained and utilized in the detection of concealed mass storage devices that might contain evidence of illegal activity such as child pornography. To lay the analytical foundation for this detection work, research was carried out to determine the volatile organic compounds associated with mass storage devices (MSD) that could be used by trained canines for detection. Headspace analysis of a variety of electronic devices was performed using solid phase microextraction (SPME) with gas chromatography/mass spectrometry (GC/MS). Analyses found several volatile compounds common to SIM and SD cards, as well as USB drives, including 2‐propenenitrile, styrene, isophorone, hydroxycyclohexyl phenyl ketone, and 2‐furanmethanol, tetrahydro. Results indicated that mass storage devices do have a characteristic odor profile making detection with minimal false alerts feasible for trained canines.  相似文献   
88.
Inspired by recent research showing that liars are reluctant to include verifiable details in their accounts, we explored in two studies (N?=?125; N?=?105) whether participants who report fabricated symptoms (‘malingerers’) present fewer verifiable details than participants who report genuine ill-health symptoms. In Study 1, participants were instructed to describe a typical day on which they had experienced a genuine or malingered symptom. Truth tellers’ statements included significantly higher proportions of verifiable details concerning the reported symptoms than malingerers’ statements. Compared with truth tellers, malingerers generated longer statements with more unverifiable details. In Study 2, we informed participants that their statements may be assessed for verifiable or checkable details. Malingerers often mentioned ‘false’ witnesses to provide checkable information and differences between malingerers and truth tellers in statement length, and checkable and uncheckable details were no longer significant. The utility and implications of the Verifiability Approach to detection of malingering are discussed.  相似文献   
89.
Attacks on operating system access control have become a significant and increasingly common problem. This type of security threat is recorded in a forensic artifact such as an authentication log. Forensic investigators will generally examine the log to analyze such incidents. An anomaly is highly correlated to an attacker's attempts to compromise the system. In this paper, we propose a novel method to automatically detect an anomaly in the access control log of an operating system. The logs will be first preprocessed and then clustered using an improved MajorClust algorithm to get a better cluster. This technique provides parameter-free clustering so that it automatically can produce an analysis report for the forensic investigators. The clustering results will be checked for anomalies based on a score that considers some factors such as the total members in a cluster, the frequency of the events in the log file, and the inter-arrival time of a specific activity. We also provide a graph-based visualization of logs to assist the investigators with easy analysis. Experimental results compiled on an open dataset of a Linux authentication log show that the proposed method achieved the accuracy of 83.14% in the authentication log dataset.  相似文献   
90.
Memory analysis has been successfully utilized to detect malware in many high profile cases. The use of signature scanning to detect malicious tools is becoming an effective triaging and first response technique. In particular, the Yara library and scanner has emerged as the defacto standard in malware signature scanning for files, and there are many open source repositories of yara rules. Previous attempts to incorporate yara scanning in memory analysis yielded mixed results. This paper examines the differences between applying Yara signatures on files and in memory and how yara signatures can be developed to effectively search for malware in memory. For the first time we document a technique to identify the process owner of a physical page using the Windows PFN database. We use this to develop a context aware Yara scanning engine which can scan all processes simultaneously using a single pass over the physical image.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号