Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Chinese People's Public Security University(Science and Technology)
1007-1784
2008 Issue 2
jing wu shi zhan xun lian jiao xue guan li mo shi de tan suo yu shi jian
gao hang ; lu feng ; wang long ; wang dong
..............
page:107-109
gong an da xue ji suan ji ji chu ke cheng gai ge yu shi jian
yang ming
..............
page:103-106
Application of Data Mining into ICAI
Zheng Tao
..............
page:100-102
jia qiang gong an yuan xiao ji chu shu xue ke jiao xue gai ge shi dang wu zhi ji
xiong yun fa
..............
page:98-99
hui chen xie yin xian xian fang fa bi jiao yan jiu
shi hai qing ; shen ru ; jiang hong
..............
page:35-40
"502" xian xian qian shou yin ran se fang fa de bi jiao yan jiu
chen rui li
..............
page:30-34
ji yu zhi wen mian ji he te zheng zhi liang de zhi wen jian ding liang hua biao zhun yan jiu
lv dao zhong
..............
page:27-29
yi zhong xin xing li ti hen ji zhi mo cai liao de yan jiu
wang gui rong ; wang yuan ; chen zhen qian ; chen rui li ; shi hai qing
..............
page:24-26
li yong su liao bao zhuang wu jian yan jin xing du yuan tui duan
li wen jun ; nie peng
..............
page:21-23
lc-ms ji shu ji qi zai zha yao jian ce fang mian de ying yong
yang rui qin
..............
page:18-20
- zuo ji ding suan fen xi yan jiu zong shu
meng pin jia
..............
page:11-17
Study on the Assay of MDMA and its Metabolites in Ecstasy Poisoning Samples and its Lethal Dose
zhang jian hua ; chen ning ; song qing fang ; zhang ling yun ; zhang xiao xia ; he dong sheng
..............
page:6-10
Study on the Relationship between the Shape of Drip Bloodstain and the Height
Luo Yaping;Ding Meng;Zhang Wei;Liu Yao
..............
page:1-5
xin yi dai shi bie ji shu rfid
zhu tao ; liu shu
..............
page:95-97
chu ru kou kong zhi xi tong de shu zi hua fa zhan ji ping jia
gao jie
..............
page:92-94
visual foxpro sql cha xun yu ju tan tao
chen chang hai
..............
page:89-91
true vision 3d ji shu zai fan zui xian chang huan yuan zhong de ying yong
zhao lei ; wang jing ya ; wang bin jun
..............
page:85-88
Fingerprint Identification Technique and its Application
Mei Zhongling
..............
page:81-84
Internet Traffic Theory and Strategy of Service Quality
Huang Shuhua
..............
page:76-80
ji yu ju bu xiao bo neng liang gong ju hen ji shi bie de yan jiu
yang min ; li dong yun ; wang wei dong
..............
page:73-75
Study and Design of Vulnerability Management Software in General Quantifiable Information System
Mi Jia;Huang Bo
..............
page:70-72
fan zui zhi tu de li lun yu shi jian jin zhan yan jiu
chen liang
..............
page:65-69
The Analysis and Judgment of Police Intelligence Data
chen rui ; lin xi rong ; liu song lin ; li gang ; dai xiao qing ; ma zheng
..............
page:61-64
gong an ji guan ji ceng ji shu ge xin de li lun yu shi jian tan tao
tan xiang yang ; chi song jian
..............
page:55-60
Estimation of Post -mortem Interval from Ear Temperature Taken by Infrared Ray Technique
zhang hui qin ; sun kai zhan ; zhao cui ling ; zuo lei
..............
page:48-54
Image Processing Methods of Strengthening Fingerprint Contrast on Variegated Background
gao shu hui ; xie li li ; feng wei jiang ; fang jing ran
..............
page:45-47
Determination of Experimental Conditions of Judging the Forming Time of Seal Characters by Thin - layer Chromatogram Scanning Method
Li Biao;Xie Peng;Sun Tiancheng
..............
page:41-44