首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   82篇
  免费   0篇
外交国际关系   1篇
法律   33篇
中国共产党   1篇
中国政治   5篇
政治理论   5篇
综合类   37篇
  2022年   1篇
  2021年   2篇
  2020年   4篇
  2017年   1篇
  2016年   1篇
  2015年   1篇
  2014年   6篇
  2013年   2篇
  2012年   8篇
  2011年   9篇
  2010年   3篇
  2009年   5篇
  2008年   4篇
  2007年   1篇
  2006年   6篇
  2005年   5篇
  2004年   2篇
  2003年   6篇
  2002年   6篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1995年   1篇
  1985年   1篇
  1983年   2篇
排序方式: 共有82条查询结果,搜索用时 15 毫秒
41.
Cross-national research on victimization often does not consider the cultural effects on opportunities leading to victimization. The current study uses a routine activities/lifestyles theoretical framework to examine the opportunities leading to two types of property victimization across forty-five countries. I employ fixed effect and random effect models in efforts to find the best explanation of theft and burglary victimization. The results indicate going out in the evening for leisure activities is an important source of opportunity for both types of property victimization. While a fixed effect model offers the most appropriate explanation for burglary victimization, theft is best explained by a random effects model. For theft victimization, variation in whether or not respondents work or go to school is explained, in part, by the level of development of the country. The findings provide evidence that there are different explanations of opportunity for burglary and theft victimization in a cross-national scope.  相似文献   
42.
Research Summary: We provide the results of a 1997 national‐level study of stalking among college women. Over an approximately seven‐month period, 13.1% of the women reported being stalked. Although physical harm was not common, the incidents typically lasted two months, involved frequent contact by offenders, and prompted victims to take protective actions. Lifestyle‐routine activities, prior sexual victimization, and demographic characteristics affected the risk of victimization. Policy Implications: Due to its prevalence, college and university administrators need to rectify their current neglect of stalking. Interventions may include educational programs, crime prevention seminars, reducing opportunities for stalking, and increasing informal and formal controls over stalkers.  相似文献   
43.
北京市自1993年起对出租车进行数量管制,据相关文件以及特许方式的分析,数量管制的措施是不合法的,也不符合比例原则。然而,有关数量管制的不合法文件却未得到有效清理,且我国《行政诉讼法》将抽象行政行为排除于司法审查的范围之外,使得交管局在处理申请出租车经营许可时,其管制行为依然有"法"可依,即便该管制行为严重限制了公民的经济自由。鉴此,应该尽快制定和修改相关法律、法规,逐步放开数量管制,对出租车行业实行严格的资质准入,以实现出租车行业的发展。  相似文献   
44.
45.
条形码是国际上通行的防伪措施之一。中国加入WTO后,二维条形码在经济领域必将得到更为广泛的应用,同时也成为潜在的被伪造对象。本文通过对条形码知识的介绍,提出了条形码检验研究的必要性和基本操作方法。  相似文献   
46.
利用喷墨打印机二次添加打印,特别是同机添加打印变造文件,是文件检验工作中的难题。喷墨打印机采用串行接字方式,内部结构复杂,喷嘴数目多,同一型号打印机又有多种质量模式。因此,在打印图文上往往留有较多的打印特征,如对接重叠线、对接错位线、横向白线、卫星墨点、墨点错位等。分析爱普生、惠普、佳能三个品牌的20台喷墨打印机不同质量模式的打印文件,发现这些特征重复再现频率较高,不同台打印机打印文件特征差异较大,同一台打印机在不同质量模式下特征出现的位置也不尽相同。通过提取打印文件上的打印特征,分析字车运行方向和打印图文pass数值,分解打印过程并制作检验图谱,判断打印文件的可疑区域是否符合打印规律,为确定二次添加打印提供帮助,提升检验过程的规范性、检验意见的准确性和结果依据的可读性。  相似文献   
47.
The NoSQL DBMS provides an efficient means of storing and accessing big data because its servers are more easily horizontally scalable and replicable than relational DBMSs. Its data model lacks a fixed schema, so that users can easily dynamically change the data model of applications. These characteristics of the NoSQL DBMS mean that it is increasingly used in real-time analysis, web services such as SNS, mobile apps and the storage of machine generated data such as logs and IoT (Internet of Things) data. Although the increased usage of the NoSQL DBMS increases the possibility of it becoming a target of crime, there are few papers about forensic investigation of NoSQL DBMS.In this paper, we propose a forensic investigation framework for the document store NoSQL DBMS. It is difficult to cover all of the NoSQL DBMS, as 'NoSQL' includes several distinct architectures; our forensic investigation framework, however, is focused on the document store NoSQL DBMS. In order to conduct an evaluative case study, we need to apply it to MongoDB, which is, a widely used document store NoSQL DBMS. For this case study, a crime scenario is created in an experimental environment, and then we propose in detail a forensic procedure and technical methods for MongoDB. We suggested many substantial technical investigation methods for MongoDB, including identifying real servers storing evidences in a distributed environment and transaction reconstruction method, using log analysis and recovering deleted data from the MongoDB data file structure.  相似文献   
48.
犯罪事实的写作作为公安机关侦查文书的重要组成部分,应严格按照犯罪构成要件简明扼要叙述,做到条理清楚,层次分明,语言规范,尽量使用法律术语。  相似文献   
49.
对一份文件最早制成时间的检验一直以来都是全世界文检界的难题之一。核实可疑文件的制成时间没有统一的方法,目前主要通过对纸张、墨迹、打字机、复印机、打印机、传真机、印刷品,以及笔迹和签名等因素的检验来确定一份文件的制成时间。文件检验人员需要充分利用他们手中的文件的内容及文件周边信息所反映出来的条件和材料,进而得出结论。  相似文献   
50.
《Digital Investigation》2014,11(1):43-56
Digital forensics practitioners face a continual increase in the volume of data they must analyze, which exacerbates the problem of finding relevant information in a noisy domain. Current technologies make use of keyword based search to isolate relevant documents and minimize false positives with respect to investigative goals. Unfortunately, selecting appropriate keywords is a complex and challenging task. Latent Dirichlet Allocation (LDA) offers a possible way to relax keyword selection by returning topically similar documents. This research compares regular expression search techniques and LDA using the Real Data Corpus (RDC). The RDC, a set of over 2400 disks from real users, is first analyzed to craft effective tests. Three tests are executed with the results indicating that, while LDA search should not be used as a replacement to regular expression search, it does offer benefits. First, it is able to locate documents when few, if any, of the keywords exist within them. Second, it improves data browsing and deals with keyword ambiguity by segmenting the documents into topics.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号