Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Chinese People's Public Security University(Science and Technology)
1007-1784
2010 Issue 2
zu di ya li fen bu nian ling cha yi fen xi
ma yue ; wang zi dan
..............
page:5-7
gong an yuan xiao wu shu san da jiao xue xun lian zhong zhan ji yun yong de yan jiu
wang ke ping
..............
page:101-103
Study on the Personnel Evacuation in Badminton Court by Using Computer Emulation Method
Zheng Tao;Zhang Min;Wang Hui
..............
page:46-48
zhong guo xian dai jing cha pei xun ti xi zhong de " li yi xiang guan fang " ji qi xin xi fan kui mo shi
du fang
..............
page:66-68
Research Based on Discrimination of Characteristics of Flame Flickering
Wu Hongsen;Lu Difei;Tao Yonghong
..............
page:28-31
gong an da xue ying yu kou yu jiao xue ce lue tan suo
wang chun xia
..............
page:94-97
fu bai sheng wu jian cai zhong jia ji yi liu lin de jian yan
chang jing ; cui wei ; zhang lei ping ; zuo yu min ; yang jun
..............
page:12-14
zigbee wu xian bao jing xi tong de she ji yu shi xian
du zhi guo ; deng ; wu shao zheng
..............
page:83-86
Research on the Early Warming Index System of Urban Road Traffic Safety
Wang Xiaohui;Liu Dong
..............
page:58-61
Determination of Compound Aminopyrine Phenacetin Tablets in Human Blood by Combining Matrix Solid Phase Dispersion with GC/MS
Wang Yingchun;Han Chi;Xie Zengrui
..............
page:19-20
The Resolution Scheme of Multicast Security with TESLA Supported by Improving GDOI
Han Hua
..............
page:42-45
lun jing cha de shi zhan neng li
shi bin
..............
page:62-65
lun da xing ti yu huo dong zhong qun ti xing shi jian de xian chang chu zhi zhan shu
li lian zhong
..............
page:69-71
fpf wu zheng zai jiao tong shi gu xian chang zhong jian zhong de zheng ju zuo yong
he hong yuan
..............
page:8-11
Design and Implementation of Crime Scene Match System
Zhao Xingtao;Wang Binjun
..............
page:32-35
A Differential Binarization Based Fingerprint Processing Algorithm
Shen Jin
..............
page:36-41
ID Correcting Method Based on Redundancy Check and Information Calibration
Li Wenhong;Wang Yihong;Cui Yue
..............
page:87-90
Genetic Polymorphism of Three STR Loci in Xiuyan Manchu and Guangzhou Han Populations
yuan li ; ye jian ; jiang cheng tao ; zhang feng shou
..............
page:15-18
2005 nian ban di wu tao ren min bi zhen wei bai yuan quan bi jiao yan jiu
fang peng ; zhang xue feng ; ma ji gang
..............
page:21-27
shi pin jian kong biao zhun dui an fang xi tong tu xiang zhi liang de ying xiang
liu jun ; chen he
..............
page:72-75
ji yu jiao tong shi gu gong cheng xue fen xi fa de jiao tong can yu fang shi ren ding yan jiu
yang run kai
..............
page:54-57
fan kong xing dong zhong li yong kong qi chong ji bo po chu fang dao men de yan jiu
jiang fei ; han feng ; wang jian zhong
..............
page:91-93
lun " jiao xue lian zhan yan " yi ti hua
wei zhi zhao
..............
page:104-108
Exploration and Practice of Indoor Positioning System (IPS) Applied in Public Security Sector
Zhou Qianli
..............
page:76-82
ying dui fang shi dui jiao tong jing cha gong zuo ya li he gong zuo man yi du de ying xiang
zhao yuan yuan
..............
page:49-53
gong an yuan xiao xian dai ke ji gai lun ke cheng jiao xue gai ge tan tao
lu shu hua
..............
page:98-100
dui yi zhong li ti hen ji zhi mo cai liao de gai jin yan jiu
wang gui rong ; lin long chuan
..............
page:1-4