首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   61篇
  免费   4篇
各国政治   2篇
工人农民   4篇
世界政治   6篇
外交国际关系   18篇
法律   25篇
政治理论   10篇
  2022年   2篇
  2021年   1篇
  2019年   2篇
  2018年   2篇
  2017年   1篇
  2016年   5篇
  2015年   2篇
  2014年   4篇
  2013年   18篇
  2012年   2篇
  2011年   3篇
  2010年   1篇
  2009年   2篇
  2008年   2篇
  2007年   4篇
  2006年   1篇
  2005年   5篇
  2004年   3篇
  2003年   1篇
  2002年   1篇
  1998年   2篇
  1980年   1篇
排序方式: 共有65条查询结果,搜索用时 31 毫秒
1.
In 2005 Indonesian and European institutes joined to start the first step for the implementation of an Ocean Operational System in the Indonesian archipelago. The system will support the decision making process for the sustainable use of marine resources, providing useful information and added value products as well as a service for an improved management of the sea with high business impact to targeted groups as public authorities and commercial operators (coastal managers, fishermen, shipping companies). In this paper the System is shortly described with its potential benefits and economic and social impacts.
A. Ribotti (Corresponding author)Email:
R. Sorgente
A. Hanggono
G. M. R. Manzella
N. Hendiarti
L. Fusco
T. R. Adi
Y. S. Djajadihardja
A. R. Farhan
M. C. G. Frederik
W. F. Ma’ruf
B. Realino
V. Rupolo
P. Ruti
M. Sadly
F. Syamsudin
B. A. Subki
  相似文献   
2.
During the last decades, the activities of pirates have increased exponentially in Eastern Africa, with their attacks becoming considerably more violent. In addition to the intrastate and interstate conflicts, the lack of state capacity and the presence of terrorist groups, maritime piracy represents a serious and sustained threat to economic security. Indeed, from an economic point of view, pirates affect international trade through an increasing insecurity related to the prompt delivery of the goods transported. The aim of this work is to explore the main works on maritime piracy analyzed in quantitative economics.  相似文献   
3.
Used in the education of counselors, nurses, occupational therapists and social workers, “use of self” is a way of understanding how practitioners bring about human change. In this article, the author discusses how use of self can be applied to youth work and is related to “developmentally responsive practice” thereby providing a deep theoretical construct for understanding youth work as relational. The author concludes by presenting the barriers to the use of self paradigm in the current climate of assessment and accountability, designed to measure static inputs and outputs rather than dynamic systems or ecologies and presents a challenge to the field for designing methodologies that are equally dynamic, responsive and relational.  相似文献   
4.
5.
A clear positive case for anabolic steroids doping was confounded by alleged urine tampering during doping control procedures. Review of the chain of custody showed no flaws, but nevertheless the athlete was adamant that the urine sample should be analyzed for DNA in order to support her contention that she was not the donor of the sample. The results obtained showed that the urine sample that scored positive for steroids contained nuclear DNA that could not be matched to the DNA obtained from the athlete's blood. On the other hand, the same urine sample contained mitochondrial DNA whose nucleotide sequences spanning the hyper variable regions HV1 and HV2 proved to be identical to those determined in mitochondrial DNA amplified from the athlete's blood. The occurrence of an extraneous genotype is compatible with exogenous nuclear DNA admixture to the athlete's urine. Alternatively, taking in consideration the mitochondrial DNA, we could not exclude that a sibling or a maternal relative of the athlete could have acted as a donor of the urine utilized for doping control and DNA analysis. Both situations point to possible tampering of the urine by the athlete. Adjudication at CAS maintained previous national and international federation decision that there was no proof of a chain of custody flaw to justify the athlete's allegation of urine substitution after collection.  相似文献   
6.
Police officers served as public health sentinels to collect data on children exposed to domestic violence across an entire municipality for 1 year. This study extended research by investigating a typology of domestic violence crimes and children’s direct sensory exposure to these types. Police officers used a standard, validated protocol to collect data on all substantiated domestic violence. Findings revealed that almost half of all events had children present, and 81% of these children were directly exposed to the violence. Children under the age of 6 years old were at greater risk of exposure. Identified domestic violence households with children were more likely to be low-income, non-White, and headed by a single female, compared to households at large. Cluster analysis revealed seven domestic violence event profiles. Typology showed that children were disproportionately exposed to the most unstable and dangerous profiles including weapon use, mutual assault, and substance abuse.  相似文献   
7.
8.
Journal of Quantitative Criminology - We test the effects of four policy scenarios on recruitment into organized crime. The policy scenarios target (i) organized crime leaders and (ii) facilitators...  相似文献   
9.
The present study introduces a new approach to computer-assisted face/skull matching used for personal identification purposes in forensic anthropology.In this experiment, the authors formulated an algorithm able to identify the face of a person suspected to have disappeared, by comparing the respective person's facial image with the skull radiograph. A total of 14 subjects were selected for the study, from which a facial photograph and skull radiograph were taken and ultimately compiled into a database, saved to the hard drive of a computer. The photographs of the faces and corresponding skull radiographs were then drafted using common photographic software, taking caution not to alter the informational content of the images. Once computer generated, the facial images and menu were displayed on a color monitor. In the first phase, a few anatomic points of each photograph were selected and marked with a cross to facilitate and more accurately match the face with its corresponding skull. In the second phase, the above mentioned cross grid was superimposed on the radiographic image of the skull and brought to scale. In the third phase, the crosses were transferred to the cranial points of the radiograph. In the fourth phase, the algorithm calculated the distance of each transferred cross and the corresponding average. The smaller the mean value, the greater the index of similarity between the face and skull.A total of 196 cross-comparisons were conducted, with positive identification resulting in each case. Hence, the algorithm matched a facial photograph to the correct skull in 100% of the cases.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号