首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2511篇
  免费   66篇
各国政治   30篇
工人农民   39篇
世界政治   25篇
外交国际关系   61篇
法律   758篇
中国共产党   61篇
中国政治   434篇
政治理论   213篇
综合类   956篇
  2024年   2篇
  2023年   17篇
  2022年   24篇
  2021年   29篇
  2020年   74篇
  2019年   48篇
  2018年   62篇
  2017年   41篇
  2016年   45篇
  2015年   47篇
  2014年   176篇
  2013年   214篇
  2012年   146篇
  2011年   183篇
  2010年   191篇
  2009年   173篇
  2008年   165篇
  2007年   136篇
  2006年   159篇
  2005年   144篇
  2004年   151篇
  2003年   127篇
  2002年   104篇
  2001年   68篇
  2000年   34篇
  1999年   14篇
  1996年   1篇
  1994年   1篇
  1993年   1篇
排序方式: 共有2577条查询结果,搜索用时 15 毫秒
301.
A physical fit is an important observation that can result from the forensic analysis of trace evidence as it conveys a high degree of association between two items. However, physical fit examinations can be time-consuming, and potential bias from analysts may affect judgment. To overcome these shortcomings, a data analysis algorithm using mutual information and a decision tree has been developed to support practitioners in interpreting the evidence. We created these tools using data obtained from physical fit examinations of duct tape and textiles analyzed in previous studies, along with the reasoning behind the analysts' decisions. The relative feature importance is described by material type, enhancing the knowledge base in this field. Compared with the human analysis, the algorithms provided accuracies above 90%, with an improved rate of true positives for most duct tape subsets. Conversely, false positives were observed in high-quality scissor cut (HQ-HT-S) duct tape and textiles. As such, it is advised to use these algorithms in tandem with human analysis. Furthermore, the study evaluated the accuracy of physical fits when only partial sample lengths are available. The results of this investigation indicated that acceptable accuracies for correctly identifying true fits and non-fits occurred when at least 35% of a sample length was present. However, lower accuracies were observed for samples prone to stretching or distortion. Therefore, the models described here can provide a valuable supplementary tool but should not be the sole means of evaluating samples.  相似文献   
302.
The article addresses some of the key issues that are raised for researchers engaging with counterterrorism police officers and initiatives, when undertaking research. A significant area to explore in this context is, in fact, the issue of relationships with counterterrorism police officers who may themselves directly have been covert police officers in the past and/or who may be continuing in their current, apparently more open, role (wittingly or otherwise) as agents of broader state strategies of exploiting trust for intelligence-gathering purposes. This article suggests that it is important for researchers to understand that working within the counterterrorism field involves degrees and shades of risk in the service of trust-building, sensitivity and the empowerment of communities, and that researchers themselves can (wittingly and unwittingly) be part of wider strategies instigated by security-minded individuals or groups of counterterrorism police officers. Reflecting upon the research that we have undertaken individually and collectively over the last number of years, in the light of the most recent spate of allegations about counterterrorism police officers infiltrating activist and political protest groups, having sexual relationships, and indeed, on occasion, children, with women whilst undercover and of potentially working to entrap vulnerable individuals into planning terrorist acts, this article raises questions around trust, credibility, legitimacy, the prevalence and near unavoidability of dysfunctional agendas and the implications of all of the above for community-based approaches to counterterrorism.  相似文献   
303.
304.
Much of corporate and business information is today created and stored in electronic format. Emails, software source codes, word processed documents, metadata, spreadsheets and other forms of electronically stored information (ESI) are easier than paper documents to manage, store, search and transfer. This has led to overwhelming volumes of ESI being produced and potentially discoverable in commercial litigation than is the case with paper documents. With the explosion of ESI, the law on discovery must stay abreast with new technology. Electronic discovery (e-discovery) is an evolving field giving rise to unique challenges. This paper discusses how Singapore has responded to these challenges through updated rules of discovery and recent court decisions. These latest significant developments reflect consistent efforts to keep pace with modern technology and global trends on e-discovery in commercial litigation.  相似文献   
305.
This paper discusses the practical value of the traditional privacy protection measure “notice and consent” in the mobile context. It analyses the weakness of this approach in the mobile context through a user survey and subsequent analysis. This paper will demonstrate, in the context of mobile commerce, the simple ‘notice and consent’ measure may not be a very useful measure to enhance control; moreover, shifting the burden of privacy protection to data subjects' self-control may not be sufficient for meaningful privacy protection in the era of Big Data. Given this reality, some new solutions, such as providing meaningful alternatives, use of more effective privacy protection software, and better design of warnings and nudges are suggested.  相似文献   
306.
介绍了一种基于计算机数据库平台的实验室信息管理系统(Laboratory Information Management System,简称LIMS)为平台的毒品检测工作的质量保证体系,将毒品检测工作的一般流程和LIMS的基本功能结合,制作建立在LIMS体系架构下的每个流程的交互界面和监控程序.实现了毒品实验室的样品管理、样品状态监控、数据的录入和采集、样品分析、工作流程管理、报告的审核和发布等信息管理功能.通过在毒品检测实验室建立LIMS,充分辅助了实验室的质量管理工作,有效减少了管理工作量,使实验室工作更高效、准确和规范.  相似文献   
307.
Recently, digital forensics has become increasingly important as it is used by investigation agencies, corporate, and private sector. To supplement the limitations of evidence capacity and be recognized in court, it is essential to establish an environment that ensures the integrity of the entire process ranging from collecting and analyzing to submitting digital evidence to court. In this study, common elements were extracted by comparing and analyzing ISO/IEC 17025, 27001 standards and Interpol and Council of Europe (CoE) guidelines to derive the necessary components for building a digital forensic laboratory. Subsequently, based on 21 digital forensic experts in the field, Delphi survey and verifications were conducted in three rounds. As a result, 40 components from seven areas were derived. The research results are based on the establishment, operation, management, and authentication of a digital forensics laboratory suitable for the domestic environment, with added credibility through collection of the opinions of 21 experts in the field of digital forensics in Korea. This study can be referred to in establishing digital forensic laboratories in national, public, and private digital forensic organizations as well as for employing as competency measurement criteria in courts to evaluate the reliability of the analysis results.  相似文献   
308.
309.
The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web‐based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID‐check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time‐based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants′ true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86–94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications.  相似文献   
310.
目的采用隐瞒信息测试(concealed informationtest,CIT)模式和多通道事件相关电位(event related potential,ERP)技术,对人类大脑在不同刺激下各脑区域活动情况和活跃程度进行对比,从神经电生理学层面揭示CIT模式隐瞒信息状态下视觉刺激人类大脑认知相关脑功能区特征。方法参考犯罪知情测试模式(GKT)的CIT模式,选用传统扑克牌,对17名被试人员进行视觉刺激,包括:靶、探测、无关和中立刺激,获得29通道ERP波。结果靶、探测和无关刺激平均按键反应时间:775ms、774ms和720ms;探测和无关刺激各通道P300峰潜伏期配对t检验,有统计学意义(P0.05)的通道有4个;探测和无关刺激各通道P300平均波幅(400~700ms)进行配对t检验,有统计学意义(P0.05)的通道有19个。结论隐瞒知晓信息是一个由多个脑功能皮质共同完成的复杂过程,与诚实反应抑制有密切关系,与额叶前部和上部皮质、前扣带回皮质(ACC)和缘上回等脑功能皮质特异相关。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号