首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5942篇
  免费   171篇
各国政治   15篇
工人农民   14篇
世界政治   41篇
外交国际关系   45篇
法律   2214篇
中国共产党   49篇
中国政治   832篇
政治理论   136篇
综合类   2767篇
  2024年   1篇
  2023年   15篇
  2022年   26篇
  2021年   26篇
  2020年   75篇
  2019年   74篇
  2018年   66篇
  2017年   74篇
  2016年   88篇
  2015年   91篇
  2014年   315篇
  2013年   447篇
  2012年   372篇
  2011年   346篇
  2010年   409篇
  2009年   459篇
  2008年   457篇
  2007年   498篇
  2006年   456篇
  2005年   413篇
  2004年   404篇
  2003年   342篇
  2002年   270篇
  2001年   202篇
  2000年   78篇
  1999年   29篇
  1998年   9篇
  1997年   3篇
  1996年   4篇
  1995年   6篇
  1994年   7篇
  1993年   6篇
  1992年   9篇
  1991年   6篇
  1990年   3篇
  1989年   4篇
  1988年   3篇
  1987年   6篇
  1986年   6篇
  1985年   7篇
  1984年   1篇
排序方式: 共有6113条查询结果,搜索用时 15 毫秒
991.
Thirty‐eight participants took part in a study that investigated the potential cascading effects of initial exposure to extraneous context upon subsequent decision‐making. Participants investigated a mock crime scene, which included the excavation of clandestine burials that had a male skeletal cast dressed either in female or gender neutral clothing. This was followed by a forensic anthropological assessment of the skeletal remains, with a control group assessing the same male skeletal cast without any clothing context. The results indicated that the sex assessment was highly dependent upon the context in which participants were exposed to prior to the analysis. This was especially noticeable in the female clothing context where only one participant determined the male skeletal cast to be male. The results demonstrate the importance of understanding the role of context in forensic anthropology at an early stage of an investigation and its potential cascading effect on subsequent assessments.  相似文献   
992.
With an increase in the creation and maintenance of personal websites, web content management systems are now frequently utilized. Such systems offer a low cost and simple solution for those seeking to develop an online presence, and subsequently, a platform from which reported defamatory content, abuse, and copyright infringement has been witnessed. This article provides an introductory forensic analysis of the three current most popular web content management systems available, WordPress, Drupal, and Joomla! Test platforms have been created, and their site structures have been examined to provide guidance for forensic practitioners facing investigations of this type. Result's document available metadata for establishing site ownership, user interactions, and stored content following analysis of artifacts including Wordpress's wp_users, and wp_comments tables, Drupal's “watchdog” records, and Joomla!'s _users, and _content tables. Finally, investigatory limitations documenting the difficulties of investigating WCMS usage are noted, and analysis recommendations are offered.  相似文献   
993.
This study is part of a larger research project on police crime in the United States. Police crimes are those criminal offenses committed by sworn law enforcement officers who have the general powers of arrest. Profit-motivated police crime involves officers who use their authority of position to engage in crime for personal gain. This study reports the findings on 1,591 cases where a law enforcement officer was arrested for one or more profit-motivated crimes during the seven-year period 2005–2011. The profit-motivated arrest cases involved 1,396 individual officers employed by 782 state, local, special, constable, and tribal law enforcement agencies located in 531 counties and independent cities in 47 states and the District of Columbia. Our data is the first systematic study of profit-motivated police crime. The study describes the nature of this form of police misconduct in terms of several dimensions, including the characteristics of police who perpetrate these crimes, where it occurs, the specific criminal charges, and the contexts within which profit-motivated police crime is punished through police agencies and the criminal courts.  相似文献   
994.
A prototype using simple mathematical treatment of the pen pressure data recorded by a digital pen movement recording device was derived. In this study, a total of 48 sets of signature and initial specimens were collected. Pearson's correlation coefficient was used to compare the data of the pen pressure patterns. From the 820 pair comparisons of the 48 sets of genuine signatures, a high degree of matching was found in which 95.4% (782 pairs) and 80% (656 pairs) had rPA > 0.7 and rPA > 0.8, respectively. In the comparison of the 23 forged signatures with their corresponding control signatures, 20 of them (89.2% of pairs) had rPA values < 0.6, showing a lower degree of matching when compared with the results of the genuine signatures. The prototype could be used as a complementary technique to improve the objectivity of signature examination and also has a good potential to be developed as a tool for automated signature identification.  相似文献   
995.
Previously unreported line patterns visible under ultraviolet light were observed on a proportion of plain white A4 printer/copier paper from different manufacturers. These Ultraviolet Line Patterns (UVLPs) usually appear as stripes down the vertical length of the paper. Typically, the UVLPs were found to “repeat” through the ream in a predictable way, while also changing. It is postulated that the repeating nature of the UVLPs is a result of the way that paper is manufactured. This leads to the ability to sequence the sheets compared to their original source paper. Even in the absence of UVLPs, it is possible to use our observation of the manufacturing process to anticipate the order of several sheets of paper and conclusively associate them, in some cases, by physically fitting their machine cut edges and crossing paper fibers. Such a novel approach to examining questioned documents would be highly useful in forensic casework.  相似文献   
996.
A backspatter pattern results from blood drops that travel retrograde to an applied external force. Historically, an array of animals and nonhuman objects have been used to create and study backspatter patterns. In this study, backspatter patterns captured on foam core targets that were placed 45.72 cm (18 in) behind the impact site (occipital area of the skull) were produced by cranial gunshots to human cadavers that were reinfused with fresh defibrinated bovine blood. These patterns were compared to the backspatter patterns produced by shooting blood‐soaked sponges, a typical simulant used in controlled studies of backspatter pattern production and characteristics. The backspatter pattern produced by shooting an actual human head was found to be different than those of blood‐soaked sponges in the number of stains produced, the size and size range of the stains, and the stain dispersion patterns.  相似文献   
997.
Evidence materials in a presumed suicide case were studied by a firearm examiner and a forensic chemist. The victim's body with double gunshot wounding in his forehead, a machine gun in the sustained fire mode with a silencer, and four cartridge cases were found. Examinations of the evidence, the case file studies, and experiments dedicated to the case were carried out. Relationships between the placement of cartridge cases and the gun were established using a fast camera. The distributions of gunshot residues on the evidence materials and within the comparative gunshot patterns were studied by means of optical and electron microscopy, X‐ray microanalysis, and infrared spectroscopy. The shooting distance was assessed to be 30 cm or more, whereas the greatest distance that could have been achieved by the victim himself was about 11–13 cm. The obtained results supported the version of homicide rather than suicide.  相似文献   
998.
Symbolic politics are often considered to be closely linked to an alarmist rhetoric, as well as to punitive crime policy initiatives. This article explores the symbolic dimension of the Swedish crime policy debate. Since Sweden is frequently depicted as an antithesis to punitive Anglophone societies, exploring symbolic politics in this setting might expand our understanding of what symbolic statements may consist of. The article analyses the electoral campaign preceding the Swedish general election of 2014, with the aim of identifying which symbolic statements occupy a central position in the debate through the use of a qualitative content analysis. This analysis reveals an ambiguous political rhetoric, comprising morally and emotionally charged condemnatory statements about getting tough on crime, as well as reformist and restrained references to expert knowledge and long-term solutions. On the one hand, these reformist statements strengthen the image of Swedish crime policy as being based on ideals such as rationality and humanity. On the other, they also serve to legitimize and obscure penal expansion.  相似文献   
999.
1000.
This article describes a New Zealand forensic agency's contextual information management protocol for bloodstain pattern evidence examined in the laboratory. In an effort to create a protocol that would have minimal impact on current work-flow, while still effectively removing task-irrelevant contextual information, the protocol was designed following an in-depth consultation with management and forensic staff. The resulting design was for a protocol of independent-checking (i.e. blind peer-review) where the checker's interpretation of the evidence is conducted in the absence of case information and the original examiner's notes or interpretation(s). At the conclusion of a ten-case trial period, there was widespread agreement that the protocol had minimal impact on the number of people required, the cost, or the time to complete an item examination. The agency is now looking to adopt the protocol into standard operating procedures and in some cases the protocol has been extended to cover other laboratory-based examinations (e.g. fabric damage, shoeprint examination, and physical fits). The protocol developed during this trial provides a useful example for agencies seeking to adopt contextual information management into their workflow.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号