全文获取类型
收费全文 | 137篇 |
免费 | 6篇 |
专业分类
各国政治 | 5篇 |
工人农民 | 19篇 |
世界政治 | 7篇 |
外交国际关系 | 8篇 |
法律 | 53篇 |
中国政治 | 1篇 |
政治理论 | 49篇 |
综合类 | 1篇 |
出版年
2022年 | 1篇 |
2021年 | 2篇 |
2019年 | 2篇 |
2018年 | 2篇 |
2017年 | 3篇 |
2016年 | 3篇 |
2015年 | 6篇 |
2014年 | 4篇 |
2013年 | 24篇 |
2012年 | 8篇 |
2011年 | 6篇 |
2010年 | 7篇 |
2009年 | 3篇 |
2008年 | 8篇 |
2007年 | 3篇 |
2006年 | 2篇 |
2004年 | 4篇 |
2003年 | 5篇 |
2002年 | 4篇 |
2001年 | 4篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1998年 | 6篇 |
1997年 | 5篇 |
1996年 | 4篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 4篇 |
1984年 | 2篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1972年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有143条查询结果,搜索用时 15 毫秒
1.
Walter E. Bruehs Nicole M. Tucker Kimberly A. Meline 《Journal of forensic sciences》2022,67(1):200-206
Often, criminal acts involving a vehicle are caught on digital video surveillance systems. While potentially useful for an investigation, the recording conditions are typically less than optimal for the extraction of key information for the identification of the perpetrator, such as a license plate. Providing the make, model and year of a questioned vehicle is a common request for examiners, to narrow the field of potential suspect vehicles. This study seeks to compare the performance of a nonpeer-reviewed make, model, and year determination between two separate groups, specifically, trained forensic image examiners and nontrained individuals. Results show that even with varied image capture conditions and quality, the trained forensic image examiners more correctly and completely identified the test group of questioned vehicles make, model, and year. 相似文献
2.
3.
4.
5.
6.
7.
Microscopic characteristics of hacking trauma 总被引:1,自引:0,他引:1
Tucker BK Hutchinson DL Gilliland MF Charles TM Daniel HJ Wolfe LD 《Journal of forensic sciences》2001,46(2):234-240
The purpose of this study was to determine if it is possible to associate machetes, axes, and cleavers with the microscopic parallel striations they leave on the cut surfaces of the bone. Hacking trauma was experimentally inflicted on pig bones using machetes, axes, and cleavers. Negative impressions of both the cut surfaces of the bone and the weapon blades were analyzed using scanning electron microscopy. The results of this investigation indicate that it is possible to correlate a class of hacking weapons to trauma inflicted on bone by these weapons. 相似文献
8.
The Comprehensive Environmental Response, Compensation and Liability Act (CERCLA) imposes liability well beyond general corporate successor rules. A company can allocate liability to other Potentially Responsible Parties as more culpable, taking advantage of CERCLA's joint and several liability. Often a source of recovery must be teased from a complex corporate history somehow connected to the site. This article examines the basis for attributing environmental liability to entities within a corporate history, before addressing how even a bankrupt or dissolved target may still have insurance that can be tapped. Similarly, CERCLA's strict liability enables recovery from insurance with some connection to either the target's or the company's corporate history, notwithstanding insurers' non-assignment arguments. 相似文献
9.
10.