首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   65篇
  免费   0篇
各国政治   10篇
工人农民   1篇
世界政治   6篇
外交国际关系   3篇
法律   35篇
中国政治   2篇
政治理论   6篇
综合类   2篇
  2022年   1篇
  2021年   2篇
  2020年   2篇
  2019年   2篇
  2018年   3篇
  2017年   1篇
  2014年   1篇
  2013年   6篇
  2012年   1篇
  2011年   3篇
  2010年   4篇
  2009年   1篇
  2008年   1篇
  2007年   4篇
  2006年   2篇
  2005年   3篇
  2004年   2篇
  2003年   4篇
  2002年   2篇
  2001年   2篇
  1999年   3篇
  1998年   2篇
  1997年   1篇
  1995年   1篇
  1994年   2篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
  1986年   1篇
  1982年   1篇
  1979年   2篇
排序方式: 共有65条查询结果,搜索用时 15 毫秒
1.
In the age of ‘Big Data’, the potential value of open-source information for intelligence-related purposes is widely recognised. Of late, progress in this space has increasingly become associated with software that can expand our ability to gather, filter, interrelate and manipulate data through automated processes. The trend towards automation is both innovative and necessary. However, techno-centric efforts to replace human analysts with finely crafted algorithms across the board, from collection to synthesis and analysis of information, risk limiting the potential of OSINT rather than increasing its scope and impact. Effective OSINT systems must be carefully designed to facilitate complementarity, exploit the strengths, and mitigate the weaknesses of both human analysts and software solutions, obtaining the best contribution from both. Drawing on insights from the field of cognitive engineering, this article considers at a conceptual level how this might be achieved.  相似文献   
2.
This article uses social media network analysis (SMNA) to examine whether there was an astroturfing campaign on Twitter in support of the Adani Carmichael coal mine in 2017. It shows that SMNA can be used to visualize and analyze outsider lobbying activity in issue arenas and is capable of identifying networks of fake opinion. This study found that in April 2017, there was a small network of accounts that made a series of suspiciously similar pro‐Adani tweets that could be considered a form of duplicitous lobbying. However, this study concludes that these posts were likely a weak influence on public opinion in Australia and largely ineffectual as a lobbying tactic. Nevertheless, this analysis shows how communitas public interests can be subverted by covert social media campaigns used in support of corporatas goals, as well as the role digital research methods can play in protecting the integrity on public debates by exposing disingenuous actors.  相似文献   
3.
4.
A new retrieval system for a 3D facial image database was designed and its reliability was experimentally examined. This system has two steps, firstly to automatically adjust the orientation of all 3D facial images in a database to that of the 2D facial image of a target person, and then to identify the facial image of the target person from the adjusted 3D facial images in the database using a graph-matching method. From the experimental study [M. Yoshino, K. Imaizumi, T. Tanijiri, J.G. Clement, Automatic adjustment of facial orientation in 3D face image database, Jpn. J. Sci. Tech. Iden. 8 (2003) 41-47], it is concluded that the software developed for the first step will be applicable to the automatic adjustment of facial orientation in the 3D facial image database. In 28 out of 110 sets (25.5%), the 3D image of the target person was chosen as the best match (from a database of 132 3D facial images) according to the similarity of the facial image characteristics based on the graph matching. The 3D facial image of the target person was ranked in the top of 10 of the database in 75 out of 110 sets (68.2%). These results suggest that this system is inadequate for the identification level, but may be feasible for screening method in a small database. It will be necessary to further pursue the possibility of realization of a facial image retrieval system for a large database such as suspects' facial images in future.  相似文献   
5.
6.
i. Oman and Southeastern Arabia: A Bibliographic Survey. By Michael Owen Shannon. Boston, Mass., G.K.Hall & Co., 1978. pp.xvi, 165. $18.00.

ii. Türk Dili ve Edebiyati Ansiklopedisi: Devirler/Isimler/ Eserler/Terimler. Istanbul, Dergah Yayinlari, 1977. TL600 (for 2 vols.).

iii. Arab‐Israeli conflict: a historical, political, social and military bibliography. By Ronald M.De Vore. Oxford, Clio Press, 1976, pp.273. £10.45.

Conflict in the Middle East from October 1973 to July 1976: a selected bibliography. By Michael Rubner. Los Angeles, Center for the Study of Armament and Disarmament, California State University, 1977. pp.83. $3.00.

The Palestine Question: a select bibliography. Compiled from the holdings of the Dag Hammarskj?ld Library, United Nations. New York, United Nations, 1976. pp.63. £3.25 (Distributed in the U.K. by H.M.S.O.).

iv. Middle East Contemporary Survey: Volume I 1976–77.

Edited by Colin Legum. Tel Aviv, Shiloah Center for Middle Eastern and African Studies, University of Tel Aviv, and New York and London, Holmes and Meier, 1978. pp.xxiv, 684. £32.50.

v. The Modern Middle East: A Guide to Research Tools in the Social Sciences. By Reeva S.Simon. Boulder, Colorado, Westview Press, 1978. pp.xv, 283. £6.10.

vi. Gustav Meisels, Reference Literature to Arabic Studies, a bibliographical guide. Tel Aviv, University Publishing Projects Ltd., 1978. pp.xiv + 251.

vii. Saudi Arabia (World Bibliographical Series Vol.5).

Compiled by Frank A.Clements. Oxford and Santa Barbara, Clio Press, 1979. pp.xiv, 195. £16.75.

viii. The Records of the British Residency and Agencies in the Persian Gulf. IOR R/15. (India Office Records: Guides to Archive Groups). By Penelope Tuson. London, India Office Library and Records, 1979. pp.xix, 188. Pl.6. Index. £21.95.

ix. Modern Syria: An Introduction to the Literature. Compiled by C.H.Bleaney. Durham University, Centre for Middle Eastern and Islamic Studies (Occasional Papers Series, no.6). 1979. £4.00.

x. The Encyclopaedia of Islam. New Edition: Encyclopédie de 1'Islam. Nouvelle édition. Index to Volumes/aux [sic: read ‘des‘] Tomes I‐III. Compiled by/Établi par H.& J.D. Pearson. Edited by/Publié par E.van Donzel. Leiden, Brill/Paris, G.P.Maisonneuve & Larose S.A., 1979. pp.viii, 195. 60 guilders.  相似文献   

7.
The high social cost of domestic violence has caught the attention of lawmakers and criminal justice agency administrators across the country. As public awareness and concern over the incidence of domestic violence has risen, domestic violence legislation has focused on, among other things, the law enforcement response to domestic violence. The purpose of this study is to examine Florida law enforcement agency response to domestic violence by analyzing agency standard operating procedures (SOPs) across measures identified in the Florida Model Policy for Domestic Violence. Utilizing content analysis, the authors identify agency policy mandates including the number of officers responding to the scene, the use of specialized units, availability of victim advocates, and procedures for investigation.  相似文献   
8.
Courts are frequently confronted by circumstances that do not justify termination of all contact with a parent, yet present legitimate concerns regarding the physical, emotional, or mental health of the child. Supervised visitation programs afford such parents and their children the opportunity to preserve the emotionally vital parent-child relationship while protecting the child, and sometimes the other parent, from harm. As the number of children deemed to be at risk continues to rise, demand for supervised visitation services steadily exceeds supply. This article proposes that all states should make supervised visitation programs universally available by enacting legislation that provides for their creation, regulation, and funding, together with clearly defined guidelines that mandate participation in supervised visitation programs whenever specific risk factors are present.  相似文献   
9.
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号