Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Police Technology
1009-9875
2009 Issue 2
Overview on the Development and Application of Fingerprint Identification Technology
wang zuo zuo ; sun zhong ; tang xiao bo
..............
page:3
Design and Realization of Quality Judging and Controlling System of AFIS Fingerprint Information Acquisition
yu fang
..............
page:8
Thinking on the AFIS Operation Mode and Mechanism during the Transitional Period in Zhejiang Province
yao yue wu ; zhang zuo zuo
..............
page:11
wu xian diao du wang guan
shen zuo shi hao yi tong ke ji you xian gong si
..............
page:83
qian yi zhi fa ji lu yi chan pin te dian yu fa zhan qu shi
..............
page:81
xing shi hua yan jian yan jian ding zong he guan li xi tong ji qi ying yong
zhang guang hua ; gao hong ; zhao pei zuo ; yang duan ling
..............
page:77
xie di hua wen zi dong shi bie xi tong ji qi ying yong
tang cheng qing
..............
page:74
guan yu zu zhi 2009 nian gong an bu gong an ke ji cheng guo tui guang yin dao ji hua cheng guo shen bao de tong zhi
..............
page:73
Case Study of the Explosion Scene Investigation(I)
zuo hui min
..............
page:69
此问题可能是由下列各种问题导致的:
..............
page:65
pai xi xiao zhuang bei zai gong an fan kong zhong de ying yong xian zhuang he fa zhan qu shi zong shu
qin wei ; chen xue liang
..............
page:62
Comments on Sniper Rifle and Sniper
yang nan zhen
..............
page:50
Access and Play of Digital Surveillance Video
wu hua jin ; liu jian pin
..............
page:48
此问题可能是由下列各种问题导致的:
..............
page:45
Design of the CTI-based Society-linked Command and Dispatch System
han yong ; wang fang ; chen qiang
..............
page:41
Analysis on the Attack on MRTDs and Research on its Security Policy
li sheng guang ; xue yi ze ; zhang zhi jin
..............
page:37
shen fen zheng yue du ji ju de dian ci jian rong she ji
liu xiao jie ; li zuo nan
..............
page:34
li yong zhu ru gan you ti qu fen shi an jian gan bie shi ti zhi wen yi li
yu gang ; yuan ze ping
..............
page:33
che lun yin jian yan zai yi qi yi nan jiao tong zhao shi an jian de yun yong
zhu lin feng ; huang yun ; li ming
..............
page:30
gong an shu ju cang ku he shu ju wa jue ying yong yan jiu
mai yong hao ; yang chao
..............
page:27
Analysis on the Current Application of Video Conferencing in the Public Security Field
guo ping
..............
page:24
Thinking of the Palm Print Automatic Recognition System Application on Detecting a Homicide Case Happened in 11 Years Ago
zhu jian hua
..............
page:21
Research and Practice on the Safe Operation of the Basal Layer AFIS
song hang
..............
page:18
How to Achieve a Correct Understanding on AFIS Inquiry Accuracy and Leak-finding Phenomena
yang chun ming ; sun jin ping
..............
page:15