Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Public Security
1672-2396
2003 Issue 3
Americian broider check point research center
wu hong xia
..............page:158
Partition area of fire proof in building interior
Yang Ji Gong
..............page:162-163
Hydraulic computation in auto water spray system
Shuai Xiao Bao
..............page:164-165
Identification and thought about fire
fan bin ; ye zuo
..............page:166-167
Probe high-voltage fire several problems in petrochemical industry
wang ling shun
..............page:168-169
CAN bus and fire apparatus connector design
zeng de yun
..............page:171-172
Create china security enterprise core competition relying in CRM
Jiang Chang Hong
..............page:82-85
Discuss Some Aspects to Appraise a Digital Video Recorder
Zhou Chun qiao
..............page:86-87
Coordination theory applied in community security system
zuo zhi cheng
..............page:88-91
Long-distance transmission of video signal
wu wen ping
..............page:95-96
Monitor image transmission analysis
wu han wei chuang guang dian ji shu you xian gong si
..............page:97-99
Digital video technology in natural gas station of ShenLi oil field monitor
shi guang lian ; zuo xiao li
..............page:100-102
LianDi digital monitor in Angang steel
..............page:103-104
Science technology is the main battleground in crack down case
Zang Xin Fong
..............page:105-106
Introduction of biology identification technology
Lu Li Bo
..............page:107-110
Electron evidence collection
Li Shuang Qi
..............page:111-113
Observation in on-the-spot inquisition
zuo hong yun
..............page:114-116
Seize narcotic dog training procedure and method research
feng yi fan ; zhang zhi ; song xing guo ; fang jian qiang
..............page:117-118
Dog pestilence nasal mucus bacte iology cheek
sun ning ; xu ming ; he xiu ying
..............page:119
Deduce criminal suspect from action mark
zhang ze min
..............page:122-126
Crossing pass method in mix traffic condition comparative analysis
lu feng ; qian zuo wu ; hou gang
..............page:127-129
Public traffic conduct system engineering complete and evaluation
Yuan Jian Hua;Yu Chun Jun
..............page:130-132
Automobile stability trial device research
Fan Hua
..............page:133-134
Experiment form alcohol gasoline filling station
fu bang ju ; yin he
..............page:135-136
People is the basic in Tai Bei traffic
ji chun lin
..............page:140
Fill in gaps synchronize with international pace
fan chao
..............page:141-143
Trend of fiber transceiver in ITS
wang zuo
..............page:144-145
Technology create new police mode
Wan Han Qing
..............page:148-149
New trend of overseas evidence analysis development
Chen Shuang Yan
..............page:155-156
Promote "crack down crime " mechanism construction
cheng li ; ma shu de
..............page:157
Easy fire hydrant system rationality authentication
zheng jia zuo ; luo yan cheng ; wang yi gang
..............page:173-174
Probe city community fire safety system
ye guang yuan ; he pei
..............page:175-177
Fire survey in Hong Kong subway
wang ming zhen
..............page:178-179
Development and problem in intelligent community and home
Li Xian Guang
..............page:180-183
interest city security
Huang Ming Jian
..............page:184-186
Perspective bank security from "118"case of ShenYang province
Huo Zhi Jian
..............page:187-189
Patrol dog applied in "double rob"
Tang Fang Suo;Li Yu Sheng
..............page:190-191
Society pay attention to arson case increasing
wan ying
..............page:191
Discussion about "morality run safety"
zhou jian qi ; du yu qun
..............page:192-193
Develop police scouting technology of Buji district
li zhi zhong ; long hai yuan
..............page:194-196
Survey security police equipment mode
Su Jing Hua
..............page:197-198
Improve technology content of police protective equipments
Chen Yong Feng
..............page:199
China police vehicle in the future
Wang Jian Jun
..............page:200-202
The third generation alarm light source-LED
chen pin wei
..............page:206-207
New means of anti-violence
..............page:207
Computer network crime in China
Jiang Ping
..............page:208-211
Information security protect for public computer
Zhu feng Chi
..............page:212-214
Application of remote identification technology
zhang liang
..............page:215-216
How to monitor P2P software
zhou lian bing
..............page:217
Computer information system security system technology frame
zhang sheng
..............page:218-220
Stamp anti-fraud technology
Li Biao;Xie Peng
..............page:221-222
Concealed picture design and prospect
Xu Sheng Lin
..............page:223-224